Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1546932
MD5:9aa62835585485a40e45b2ae935c42b0
SHA1:208bad1614fd19318aadce03531713a2ad885cd8
SHA256:d28331e98edccdfb2709fc1af526c0cec059a6d008e54a537ce1e10a32c876be
Infos:

Detection

Score:57
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:34
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Creates multiple autostart registry keys
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
EXE planting / hijacking vulnerabilities found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Setup.exe (PID: 3192 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: 9AA62835585485A40E45B2AE935C42B0)
    • chrome.exe (PID: 6368 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa.1091y&nocache=20241101130519.339&_fcid=1728941759157143 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 5680 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7764 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7776 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
    • nspF85F.tmp (PID: 7628 cmdline: "C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force MD5: C50F23A6E99F3FAEC7A10CEB1884F73E)
      • PcAppStore.exe (PID: 7404 cmdline: "C:\Users\user\PCAppStore\PcAppStore.exe" /init default MD5: 102313158837DA34ECE7FBE599A0EEC5)
        • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
          • PcAppStore.exe (PID: 2348 cmdline: "C:\Users\user\PCAppStore\PCAppStore.exe" /init default MD5: 102313158837DA34ECE7FBE599A0EEC5)
          • AutoUpdater.exe (PID: 7924 cmdline: "C:\Users\user\PCAppStore\AutoUpdater.exe" /i MD5: 4B8501CCF1EB44EA96A20547D4EBE7D3)
        • qUkmMBjREGieFqRs.exe (PID: 2436 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5576 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 1476 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5924 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 1664 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 4632 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 4040 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 2532 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5844 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 3648 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 2852 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 3896 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 2356 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 3872 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 3632 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 876 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 4200 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 4000 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 1096 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 6728 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 3204 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 6716 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5348 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5008 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5352 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • qUkmMBjREGieFqRs.exe (PID: 5324 cmdline: "C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
      • Watchdog.exe (PID: 1176 cmdline: "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091y MD5: 3141E8E75FE71E17B1337CB97B37AB03)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: explorer.exe PID: 4004ironshell_phpSemi-Auto-generated - file ironshell.php.txtNeo23x0 Yara BRG + customization by Stefan -dfate- Molls
  • 0x290238:$s2: ~ Shell I
  • 0x2ff13e:$s2: ~ Shell I

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\PCAppStore\PCAppStore.exe" /init default, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\nspF85F.tmp, ProcessId: 7628, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PCAppStore
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpReversingLabs: Detection: 20%
Source: C:\Users\user\PCAppStore\Uninstaller.exeReversingLabs: Detection: 26%
Source: Setup.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\Watchdog.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\Uninstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\AutoUpdater.exeJump to behavior
Source: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&_winver=19045&version=fa.1091yHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&_winver=19045&version=fa.1091yHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&_winver=19045&version=fa.1091yHTTP Parser: No favicon
Source: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&_winver=19045&version=fa.1091yHTTP Parser: No favicon

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\Watchdog.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\Uninstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpEXE: C:\Users\user\PCAppStore\AutoUpdater.exeJump to behavior
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.LICENSE.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\ReadMe.txtJump to behavior
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\user\Release\PCAppStore.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844079351.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871374440.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\AppStoreUpdater\Release\auto_updater.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2979428452.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp, AutoUpdater.exe, 0000002B.00000000.2926794853.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qUkmMBjREGieFqRs.exe, 0000000F.00000000.2821420153.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000011.00000002.3344787561.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000012.00000000.2827845004.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000013.00000002.3342755033.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000014.00000000.2837813223.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000015.00000002.3344282929.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000017.00000000.2863272471.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000018.00000002.3343611148.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000019.00000000.2880863784.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001A.00000002.3344606796.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001B.00000000.2893024947.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001C.00000002.3343936895.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001D.00000000.2896892191.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001E.00000000.2899562250.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001F.00000000.2901727156.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000020.00000002.3347546003.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000021.00000000.2905603857.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000022.00000000.2907322241.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000023.00000002.3345223750.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000024.00000000.2917264974.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000025.00000000.2918252898.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000026.00000000.2919162014.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000027.00000002.3344628363.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000028.00000000.2921297630.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000029.00000002.3343075972.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000002A.00000002.3344456864.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\Watchdog\x64\Release\Watchdog.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000000.2745424571.00007FF67FEAA000.00000002.00000001.01000000.00000017.sdmp, Watchdog.exe, 0000000C.00000002.3364961673.00007FF67FEAA000.00000002.00000001.01000000.00000017.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\AppStoreUpdater\Release\auto_updater.pdb1 source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2979428452.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp, AutoUpdater.exe, 0000002B.00000000.2926794853.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_00405D74
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_0040699E FindFirstFileW,FindClose,9_2_0040699E
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_0040290B FindFirstFileW,9_2_0040290B
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67A88 FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,11_2_00007FF6EDA67A88
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67B38 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,11_2_00007FF6EDA67B38
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE91690 FindClose,FindFirstFileExW,GetLastError,12_2_00007FF67FE91690
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE91704 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,12_2_00007FF67FE91704
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA02E0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00007FF67FEA02E0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E376D890 wsprintfW,FindFirstFileW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,43_2_00007FF6E376D890
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BDA78 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_00007FF6E37BDA78
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37704D0 GetTickCount,Concurrency::details::WorkQueue::IsStructuredEmpty,Concurrency::details::WorkQueue::IsStructuredEmpty,URLDownloadToFileW,ShellExecuteExW,WaitForSingleObject,CloseHandle,43_2_00007FF6E37704D0
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Joe Sandbox ViewIP Address: 212.102.56.179 212.102.56.179
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8FD3B0 GetTickCount64,Sleep,GetTickCount,Sleep,URLDownloadToFileW,Sleep,DeleteFileW,11_2_00007FF6ED8FD3B0
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: %https://www.youtube.com/?feature=ytca equals www.youtube.com (Youtube)
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: @https://www.youtube.com/s/notifications/manifest/cr_install.html equals www.youtube.com (Youtube)
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/: equals www.youtube.com (Youtube)
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/J equals www.youtube.com (Youtube)
Source: chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/s/notifications/manifest/cr_install.html equals www.youtube.com (Youtube)
Source: chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/1423136
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2517
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2517hh
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3206
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3577
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3584
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3586
Source: chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3623
Source: chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3624
Source: chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3625
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3832
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3862
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3965
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3970
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4324
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4405
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4551
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4836
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5007
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5055
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5061
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5281
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5371
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5421
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5430
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5658
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5658ed
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5750
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5750ed
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5881
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5881Dz
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5901
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5906
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6041
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6041ed
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6048
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6141
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6248
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6439
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6692
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6692eg
Source: chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6860
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6878
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6878Sz
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6953
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7036
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7172
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7279
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7279k
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7488
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7553
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7556
Source: chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7724
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7760
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7760H
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7761
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8215
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8229
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8280
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co_
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://clients2.google.com/time/1/current
Source: chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://clientservices.googleapis.com/chrome-variations/seed?osname=win&channel=stable&milestone=117
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4Cz
Source: Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAt
Source: chrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pa
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx348//k
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppeemjh
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.0/jamhcnnkihi
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompecagna
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckhobagln
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efniojlnjndmcbiieeg
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.689539685.14/ob
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkkcocm
Source: chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpimlhhgieaddgfe
Source: chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eeigpng
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncanleaf
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkjd
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgkjcecd
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcji
Source: chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaea
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dl.google.com/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkkehgbnf
Source: chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dns-tunnel-check.googlezip.net/connect
Source: chrome.exe, 00000003.00000002.3401345891.00006BB402E88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwy
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00
Source: chrome.exe, 00000003.00000002.3410574026.00006BB4037DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_
Source: chrome.exe, 00000003.00000002.3406840880.00006BB403304000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebnd
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.0
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookg
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efniojl
Source: chrome.exe, 00000003.00000002.3388639016.00006BB40234C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.689
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjk
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpim
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.23
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/k
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/go
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/nei
Source: chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbog
Source: chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.120
Source: chrome.exe, 00000003.00000002.3387459126.00006BB40229E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://google.com/
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://issuetracker.google.com/200067929
Source: chrome.exe, 00000003.00000002.3380545033.000001FDB7C97000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://localhost:64111/browseore/api/api.php
Source: Setup.exe, 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Setup.exe, 00000000.00000000.2093941710.000000000040A000.00000008.00000001.01000000.00000003.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000000.2353764082.000000000040A000.00000008.00000001.01000000.0000000F.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3379960546.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3379960546.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.2776598331.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.2776598331.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS0
Source: chrome.exe, 00000003.00000002.3410574026.00006BB4037DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64
Source: chrome.exe, 00000003.00000002.3406840880.00006BB403304000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.cr
Source: chrome.exe, 00000003.00000002.3397853934.00006BB402BB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
Source: chrome.exe, 00000003.00000002.3397853934.00006BB402BB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certsk
Source: Setup.exe, 00000000.00000003.2375030500.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374789073.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374661577.0000000002C1F000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2376349408.0000000002C3B000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF1000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002FF9000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgy
Source: chrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_thir
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppe
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.0/jamhcnn
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompec
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckhob
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efniojlnjndmcbi
Source: chrome.exe, 00000003.00000002.3389010489.00006BB40238C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.689539685.1
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkk
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpimlhhgiead
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eei
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncan
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjd
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgkj
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindgg
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhl
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/dl/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkkeh
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gstatic.com/generate_204
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accountcapabilities-pa.googleapis.com/
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accountcapabilities-pa.googleapis.com/v1/accountcapabilities:batchGet
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accountcapabilities-pa.googleapis.com/v1/accountcapabilities:batchGetk
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395936018.00006BB402A0C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/AddSession
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/GetCheckConnectionInfo
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ListAccounts?json=standard
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/Logout
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/MergeSession
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/OAuthLogin
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/RotateBoundCookies
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/chrome/blank.html
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/chrome/blank.htmlB
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/reauth/chromeos
Source: chrome.exe, 00000003.00000002.3387944346.00006BB4022B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/chrome/usermenu
Source: chrome.exe, 00000003.00000002.3387944346.00006BB4022B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/kidsignin/chromeos
Source: chrome.exe, 00000003.00000002.3387944346.00006BB4022B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/kidsignup/chromeos
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/v2/chromeos
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/windows
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/xreauth/chrome
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/encryption/unlock/desktop
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxAB
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/o/oauth2/revoke
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/oauth/multilogin
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/signin/chrome/sync?ssp=1
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com:443
Source: chrome.exe, 00000003.00000002.3398895321.00006BB402CB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://alling.p
Source: chrome.exe, 00000003.00000002.3378120947.000001FDB785D000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://analytics.google.com/g/collect?v=2&tid=G-VFQWFX3X1C&gtm=45je4au0v898645365za200zb9103256652&
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4830
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4830g
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4966
Source: chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/5845
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/6574
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7161
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7162
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7162z
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7246
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7320
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7369
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7489
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7604
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7714
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7847
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7899
Source: chrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.ico
Source: chrome.exe, 00000003.00000002.3387756910.00006BB4022A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/search?ei=&fr=crmas&p=
Source: chrome.exe, 00000003.00000002.3387756910.00006BB4022A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/search?ei=&fr=crmas&p=searchTerms
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393143104.00006BB402780000.00000004.00000001.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore
Source: chrome.exe, 00000003.00000002.3393143104.00006BB402780000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore206E5
Source: chrome.exe, 00000003.00000002.3397933111.00006BB402BD4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
Source: chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enN
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://chromekanonymity-pa.googleapis.com/
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://chromekanonymityauth-pa.googleapis.com/
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityauth-pa.googleapis.com/KAnonymityServiceJoinRelayServerhttps://chromekanonym
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityquery-pa.googleapis.com/
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://chromekanonymityquery-pa.googleapis.com/(
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://chromekanonymityquery-pa.googleapis.com/(TrustTokenOperationsRequiringOriginTrial#all-operat
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chromereporting-pa.googleapis.com/v1/events
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chromereporting-pa.googleapis.com/v1/record
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.3080624079.000002A10D895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromewebstore.google.com/
Source: chrome.exe, 00000003.00000002.3393280979.00006BB4027A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://chromium-i18n.appspot.com/ssl-aggregate-address/
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://classroom.googleapis.com/
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://classroom.googleapis.com/g
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3399907740.00006BB402DA4000.00000004.00000001.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3367862742.000002A10D884000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.3080756480.000002A10D87D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crx
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://clients4.google.com/chrome-sync
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://clients4.google.com/chrome-sync/event
Source: chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://clientservices.googleapis.com/chrome-variations/seed?osname=win&channel=stable&milestone=117
Source: chrome.exe, 00000003.00000002.3391866256.00006BB402622000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3413734659.00006BB403D30000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398357448.00006BB402C44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415103967.00006BB403E34000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414375666.00006BB403DB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/analytics-container-tag-serving
Source: chrome.exe, 00000003.00000002.3414283844.00006BB403D88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/analytics-container-tag-serving6
Source: chrome.exe, 00000003.00000002.3398357448.00006BB402C44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/analytics-container-tag-servingCross-Origin-Resource-Policy:
Source: chrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/analytics-container-tag-servingk
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414132830.00006BB403D6C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414375666.00006BB403DB0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406737921.00006BB4032EC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3376890952.000001FDB76AD000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/clientupdate-aus/1
Source: chrome.exe, 00000003.00000002.3414132830.00006BB403D6C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/clientupdate-aus/1k
Source: chrome.exe, 00000003.00000002.3390961657.00006BB402500000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404372885.00006BB403134000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/download-dt/1
Source: chrome.exe, 00000003.00000002.3390961657.00006BB402500000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404372885.00006BB403134000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/download-dt/1Content-Security-Policy:
Source: chrome.exe, 00000003.00000002.3390961657.00006BB402500000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404372885.00006BB403134000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/download-dt/1Content-Type:
Source: chrome.exe, 00000003.00000002.3390961657.00006BB402500000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404372885.00006BB403134000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/download-dt/1d
Source: chrome.exe, 00000003.00000002.3398357448.00006BB402C44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/report-to/analytics-container-tag-serving
Source: chrome.exe, 00000003.00000002.3378120947.000001FDB785D000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:136:0
Source: Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/
Source: Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_insta
Source: Setup.exe, 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=ersion=fa.1091y&src=pc
Source: Setup.exe, 00000000.00000002.2375464054.00000000005C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1091y
Source: Setup.exe, 00000000.00000002.2376129578.0000000002BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1091y:
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjA
Source: chrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_p
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx348/
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppeemj
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.0/jamhcnnkih
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompecagn
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckhobagl
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efniojlnjndmcbiiee
Source: chrome.exe, 00000003.00000002.3389010489.00006BB40238C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.689539685.14/o
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkkcoc
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpimlhhgieaddgf
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eeigpn
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncanlea
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkj
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgkjcec
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcj
Source: chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaae
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkkehgbn
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/?usp=installed_webapp
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/installwebapp?usp=chrome_default
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/u/0/create?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/forms/u/0/create?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/?usp=installed_webapp
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/installwebapp?usp=chrome_default
Source: chrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/u/0/create?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/?usp=installed_webapp
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
Source: chrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3412371516.00006BB403B68000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409353508.00006BB40363C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3402467161.00006BB402F10000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409278088.00006BB403634000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411874127.00006BB403AFC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410500926.00006BB4037BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405263345.00006BB4031DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/$
Source: chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/H
Source: chrome.exe, 00000003.00000002.3412371516.00006BB403B68000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409353508.00006BB40363C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3402467161.00006BB402F10000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410500926.00006BB4037BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405263345.00006BB4031DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/ore/
Source: chrome.exe, 00000003.00000002.3409278088.00006BB403634000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/ore/B
Source: chrome.exe, 00000003.00000002.3411874127.00006BB403AFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/rPolicy
Source: chrome.exe, 00000003.00000002.3411874127.00006BB403AFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/rmorithmz
Source: chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/t/
Source: chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://doubleclick.net/t/k
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?lfhs=2
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391467376.00006BB402590000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/drive/installwebapp?usp=chrome_default
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: chrome.exe, 00000003.00000002.3410574026.00006BB4037DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64
Source: chrome.exe, 00000003.00000002.3406840880.00006BB403304000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.cr
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebn
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.
Source: chrome.exe, 00000003.00000002.3403478249.00006BB4030AC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflook
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efnioj
Source: chrome.exe, 00000003.00000002.3388639016.00006BB40234C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.68
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmj
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpi
Source: chrome.exe, 00000003.00000002.3389010489.00006BB40238C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.2
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.130
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/g
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/ne
Source: chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbo
Source: chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://edgedl.me.gvt1.com/edgedl/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.12
Source: chrome.exe, 00000003.00000002.3378120947.000001FDB7857000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css2?family=Inter:wght
Source: chrome.exe, 00000003.00000002.3415722800.00006BB403EC4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://goog.com
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-query.fastly-edge.com/
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-safebrowsing.fastly-edge.com/
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3386888274.00006BB40220C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://google.com/
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://google.com/googleapis.com
Source: chrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3380545033.000001FDB7C9D000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3376890952.000001FDB76AD000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
Source: chrome.exe, 00000003.00000002.3397251590.00006BB402B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480725597&cv=
Source: chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480726201&cv=
Source: chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410426942.00006BB4037AC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410003616.00006BB403744000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408348943.00006BB403504000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409433085.00006BB403660000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408185321.00006BB4034D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googletagmanager.com/
Source: chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googletagmanager.com/=
Source: chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409433085.00006BB403660000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googletagmanager.com/k
Source: chrome.exe, 00000003.00000002.3408348943.00006BB403504000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googletagmanager.com/y
Source: chrome.exe, 00000003.00000002.3393143104.00006BB402780000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://googleusercontent.com/
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/161903006
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/166809097
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/184850002
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/187425444
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/220069903
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/229267970
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/250706693
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/253522366
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/255411748
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/258207403
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/274859104
Source: chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/284462263
Source: chrome.exe, 00000003.00000002.3405174031.00006BB4031CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/issues/166475273
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
Source: chrome.exe, 00000003.00000002.3417908847.00007AF400284000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2
Source: chrome.exe, 00000003.00000002.3417908847.00007AF400284000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard#exps-registration-success-page-urls
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardPi
Source: chrome.exe, 00000003.00000002.3419818352.00007AF400780000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardhttps://labs.google.com/search/experiments
Source: chrome.exe, 00000003.00000002.3417908847.00007AF400284000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardz
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiments
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3419772934.00007AF400754000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/upload
Source: chrome.exe, 00000003.00000002.3376564802.000001FDB7390000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/upload#companion-iph-blocklisted-page-urls
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116Plus
Source: chrome.exe, 00000003.00000002.3419872770.00007AF400794000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918
Source: chrome.exe, 00000003.00000002.3419772934.00007AF400754000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadcompanion-iph-blocklisted-page-urlsexps-registration-success-page-u
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://m.google.com/devicemanagement/data/api
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://m.google.com/devicemanagement/data/apik
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?usp=installed_webapp
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391467376.00006BB402590000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/installwebapp?usp=chrome_default
Source: chrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://oauthaccountmanager.googleapis.com/
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://oauthaccountmanager.googleapis.com/v1/issuetoken
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400563824.00006BB402E1C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1&target=OPTIMIZATION_TARGET_PAGE_TOPICS_
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400563824.00006BB402E1C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1695049414&target=OPTIMIZATION_TARGET_NOT
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400563824.00006BB402E1C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1695051229&target=OPTIMIZATION_TARGET_PAG
Source: chrome.exe, 00000003.00000002.3413644212.00006BB403D14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pagead2.googlesyndication.com/pagead/ge
Source: chrome.exe, 00000003.00000002.3413644212.00006BB403D14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pagead2.googlesyndication.com/pagead/ge_204/?i
Source: chrome.exe, 00000003.00000002.3413644212.00006BB403D14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_204/?id=turtlex_join_ig&tx_jig=$
Source: chrome.exe, 00000003.00000002.3406164652.00006BB403280000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405758513.00006BB40323C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3389909033.00006BB40247C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392967994.00006BB402750000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.st
Source: chrome.exe, 00000003.00000002.3406164652.00006BB403280000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.stapi.php
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391701402.00006BB4025EC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414494506.00006BB403DCC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store
Source: chrome.exe, 00000003.00000002.3401345891.00006BB402E88000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3378120947.000001FDB785D000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3387298139.00006BB40226C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397555319.00006BB402B90000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394176825.00006BB40288A000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407744038.00006BB4033BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398267013.00006BB402C2C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405832387.00006BB403254000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3378120947.000001FDB7857000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3412293775.00006BB403B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406304481.00006BB40329C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3388745796.00006BB40235C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408429003.00006BB403518000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3399907740.00006BB402DA4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3369780144.000000255B5FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/
Source: chrome.exe, 00000003.00000002.3381693437.000001FDB9F53000.00000002.00000001.00040000.0000001F.sdmp, chrome.exe, 00000003.00000002.3407966343.00006BB4033C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store//
Source: chrome.exe, 00000003.00000002.3401345891.00006BB402E88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/41759157143
Source: chrome.exe, 00000003.00000002.3397853934.00006BB402BB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/9s
Source: chrome.exe, 00000003.00000002.3416202841.00006BB40410C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/?p=lpd_instal
Source: chrome.exe, 00000003.00000002.3415922589.00006BB4040A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0
Source: chrome.exe, 00000003.00000002.3389349150.00006BB4023BB000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406443227.00006BB4032AC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406737921.00006BB4032EC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390060894.00006BB4024A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3388113850.00006BB4022E0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398780813.00006BB402C8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3380545033.000001FDB7C9D000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000003.3299453209.00006BB4024A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/?p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=17289417591
Source: chrome.exe, 00000003.00000002.3416202841.00006BB40410C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/?p=lpd_instalng
Source: Setup.exe, 00000000.00000002.2375464054.00000000005C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/LMEMH
Source: chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/P
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395936018.00006BB402A0C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3380545033.000001FDB7C97000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3413734659.00006BB403D30000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3413644212.00006BB403D14000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3376890952.000001FDB76AD000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://pcapp.store/api/api.php
Source: chrome.exe, 00000003.00000002.3380545033.000001FDB7C97000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://pcapp.store/api/api.php3848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%
Source: chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/api/api.phpi
Source: chrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/api/api.phpk
Source: chrome.exe, 00000003.00000002.3391866256.00006BB40260C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/images/front_img/lp/lpd_installing_r2/img/done_cursor_icon.svg
Source: Setup.exe, 00000000.00000003.2129137714.000000000063E000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2119038620.0000000002BCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/inst_cpg.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&ve
Source: Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.000000000053B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=&winver=
Source: chrome.exe, 00000003.00000002.3418520650.00007AF4002F6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-
Source: chrome.exe, 00000003.00000002.3417583888.00007AF400238000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3412293775.00006BB403B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3385131453.000038AC00238000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa
Source: chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411613783.00006BB403AB0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409036619.00006BB4035E8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410644893.00006BB4037EC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398694173.00006BB402C7C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/lp/appstore/img/favicon.ico
Source: chrome.exe, 00000003.00000002.3409929749.00006BB403738000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409036619.00006BB4035E8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398694173.00006BB402C7C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/lp/appstore/img/favicon.icok
Source: chrome.exe, 00000003.00000002.3389981283.00006BB402490000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/lp/lpd_installing_r2/src/lpd_installing_r2.min.js?nocache=1709636059406
Source: Setup.exe, 00000000.00000003.2129137714.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2153324620.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2153164892.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2132485262.00000000005F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/oreUIComponents.dll
Source: chrome.exe, 00000003.00000002.3397555319.00006BB402B90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/p=lpd_installing_r2&guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=172894175915
Source: Setup.exe, 00000000.00000003.2132485262.00000000005F6000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2722385412.000000000387E000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.0000000000597000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904637840.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.00000000004F0000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2902835115.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2722385412.0000000003880000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.000000000054E000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3367862742.000002A10D89C000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9C7000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9B0000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2977343215.0000013607CAC000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2977343215.0000013607C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&version=fa.1091y&evt_src=fa_
Source: chrome.exe, 00000003.00000002.3408963876.00006BB4035D0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408429003.00006BB403518000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410644893.00006BB4037EC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixelgif.php
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410644893.00006BB4037EC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixelgif.php420
Source: chrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixelgif.phpm
Source: Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_min
Source: Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.000000000053B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/tos.html?guid=
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store1
Source: chrome.exe, 00000003.00000002.3416774015.00006BB4044D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store1e.html?origin=https%3A%2F%2Fpcapp.store
Source: chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2978719138.0000013609990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store:443
Source: chrome.exe, 00000003.00000002.3391701402.00006BB4025EC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.storeAccess-Control-Allow-Credentials:
Source: chrome.exe, 00000003.00000002.3391534062.00006BB4025A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.storeAccess-Coro
Source: chrome.exe, 00000003.00000002.3382164987.000001FDBA117000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://pcapp.storeH
Source: chrome.exe, 00000003.00000002.3389089124.00006BB402394000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.storeHX
Source: chrome.exe, 00000003.00000002.3400484775.00006BB402E0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://pcapp.storek
Source: chrome.exe, 00000003.00000002.3410574026.00006BB4037DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://redirector.gvt1.com/edgedl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win6
Source: chrome.exe, 00000003.00000002.3406840880.00006BB403304000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://redirector.gvt1.com/edgedl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.c
Source: chrome.exe, 00000003.00000002.3402085142.00006BB402F06000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://repository.pcapp.store/pcapp/images/front_img/lp/lpd_installing_r2/img/done_cursor_icon.svg
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://sctauditing-pa.googleapis.com/v1/knownscts/length/$1/prefix/$2?key=AIzaSyBOti4mM-6x9WDnZIjIe
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://securitydomain-pa.googleapis.com/v1/
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://sites.google.com/u/0/create?usp=chrome_actions
Source: chrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://sites.google.com/u/0/create?usp=chrome_actionsactions
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://t0.gstatic.com/faviconV2
Source: chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tasks.googleapis.com/
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net
Source: chrome.exe, 00000003.00000002.3409514883.00006BB403678000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410355579.00006BB403798000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/bjs
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/bts
Source: chrome.exe, 00000003.00000002.3409514883.00006BB403678000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3377811341.000001FDB7827000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3397360300.00006BB402B64000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3404852725.00006BB403174000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/ga/rul?tid=G-VFQWFX3X1C&gacid=1295164978.1730480726&gtm=45je4au0v89864
Source: chrome.exe, 00000003.00000002.3377811341.000001FDB7827000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3412293775.00006BB403B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406840880.00006BB4032F8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3399907740.00006BB402DA4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398780813.00006BB402C8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/rul/858128210?random=1730480725597&cv=11&fst=1730480725597&fmt=3&bg=ff
Source: chrome.exe, 00000003.00000002.3412293775.00006BB403B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406840880.00006BB4032F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/rul/858128210?random=1730480725638&cv=11&fst=1730480725638&fmt=3&bg=ff
Source: chrome.exe, 00000003.00000002.3413644212.00006BB403D14000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/rul/858128210?random=1730480726201&cv=11&fst=1730480726201&fmt=3&bg=ff
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net/td/update?ig_name=4s681066530.1730480726
Source: chrome.exe, 00000003.00000002.3400484775.00006BB402E0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.neter.comccoofpliimaahmaaome
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.nethttps://pcapp.store
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://td.doubleclick.nethttps://pcapp.store/
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=156786411258&cr_id=681164326060&cv_id=1&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=156786411258&cr_id=681210400247&cv_id=2&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=156786411258&cr_id=682239234212&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820411&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820414&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820429&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820432&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820444&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820450&cv_id=
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820450&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820453&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820456&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688795175019&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688917203998&cv_id=0&format=$
Source: chrome.exe, 00000003.00000002.3395014857.00006BB402964000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000003.2892888846.00006BB402964000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://update.googleapis.com/servic
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://update.googleapis.com/service/update2/json?cup2key=13:qXNUYPPsx2qkfS9yqisBoJQVWYNk-9s_Cuaz9e
Source: chrome.exe, 00000003.00000002.3395014857.00006BB402964000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000003.2892888846.00006BB402964000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://update.googleapis.com/servicup
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=&addon=opensearch
Source: chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=&addon=opensearchn=opensearch
Source: chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
Source: chrome.exe, 00000003.00000002.3397251590.00006BB402B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/tips/
Source: chrome.exe, 00000003.00000002.3397251590.00006BB402B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/tips/gs
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTg
Source: chrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_thi
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
Source: chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3k
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmpp
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/acaldksiunzh56452py2db5mnbpa_120.0.6050.0/jamhcn
Source: chrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompe
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckho
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/aclacns2lwpknygjwzhz5vqbtzhq_1118/efniojlnjndmcb
Source: chrome.exe, 00000003.00000002.3389010489.00006BB40238C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/aclz7ibkvp257t2vgob3ecc555sa_20241018.689539685.
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnk
Source: chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/adjrtjizyvfu35elrirr7p3dsh3q_9261/hfnkpimlhhgiea
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/ee
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocnca
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabj
Source: chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgk
Source: chrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindg
Source: chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkh
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/dl/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkke
Source: chrome.exe, 00000003.00000002.3399298847.00006BB402D50000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393713128.00006BB402818000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.icoenterInsights
Source: chrome.exe, 00000003.00000002.3391467376.00006BB402590000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/tools/feedback/chrome/__submit
Source: chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v1/userinfo
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v2/tokeninfo
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v4/token
Source: chrome.exe, 00000003.00000002.3389750307.00006BB40240C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/reauth/v1beta/users/
Source: chrome.exe, 00000003.00000002.3382164987.000001FDBA117000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3389089124.00006BB402394000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409433085.00006BB403660000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414494506.00006BB403DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/
Source: chrome.exe, 00000003.00000002.3412371516.00006BB403B68000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/crx0
Source: chrome.exe, 00000003.00000002.3394176825.00006BB402874000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397853934.00006BB402BB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=AW-858128210
Source: chrome.exe, 00000003.00000002.3397853934.00006BB402BB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C&l=dataLayer&cx=c
Source: chrome.exe, 00000003.00000002.3409433085.00006BB403660000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/k
Source: chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393713128.00006BB402818000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394624772.00006BB4028DC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414967446.00006BB403E1C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414494506.00006BB403DCC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.store
Source: chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.storek
Source: chrome.exe, 00000003.00000002.3406840880.00006BB403304000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393713128.00006BB402818000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414967446.00006BB403E1C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.storepp
Source: chrome.exe, 00000003.00000002.3414283844.00006BB403D88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.storeto
Source: chrome.exe, 00000003.00000002.3402085142.00006BB402F08000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392440613.00006BB402694000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/static/service_worker/4al0/sw_iframe.html?origin=https%3A%2F%2Fpcap
Source: chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.comH
Source: chrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392440613.00006BB402694000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/chrome/intelligence/assist/ranker/models/translate/2017/03/translate_ranker_
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/:
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/?feature=ytca
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/J
Source: chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3390402039.00006BB4024D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/s/notifications/manifest/cr_install.html
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindows user hook set: 0 mouse low level C:\Users\user\PCAppStore\PcAppStore.exeJump to behavior

System Summary

barindex
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_00403640
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040755C0_2_0040755C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406D850_2_00406D85
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_00406D5F9_2_00406D5F
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA9AC9011_2_00007FF6EDA9AC90
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8E9DE011_2_00007FF6ED8E9DE0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA9BB3411_2_00007FF6EDA9BB34
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAB170411_2_00007FF6EDAB1704
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8AEE411_2_00007FF6EDA8AEE4
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA9CE5411_2_00007FF6EDA9CE54
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8B0E811_2_00007FF6EDA8B0E8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAB106811_2_00007FF6EDAB1068
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA302411_2_00007FF6EDAA3024
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8CBEC11_2_00007FF6EDA8CBEC
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA057C11_2_00007FF6EDAA057C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8C86811_2_00007FF6EDA8C868
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA826C11_2_00007FF6EDAA826C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8E21811_2_00007FF6EDA8E218
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA84E811_2_00007FF6EDAA84E8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA1EEC11_2_00007FF6EDAA1EEC
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA9BE1811_2_00007FF6EDA9BE18
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8DE1411_2_00007FF6EDA8DE14
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA959F011_2_00007FF6EDA959F0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67B3811_2_00007FF6EDA67B38
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8B70411_2_00007FF6EDA8B704
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8B90811_2_00007FF6EDA8B908
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA186C11_2_00007FF6EDAA186C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8C17C011_2_00007FF6ED8C17C0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8B2F411_2_00007FF6EDA8B2F4
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA7F2B411_2_00007FF6EDA7F2B4
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA6D22C11_2_00007FF6EDA6D22C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA9F23411_2_00007FF6EDA9F234
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA8B4F811_2_00007FF6EDA8B4F8
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAAF49811_2_00007FF6EDAAF498
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA13D811_2_00007FF6EDAA13D8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9D8F812_2_00007FF67FE9D8F8
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9909812_2_00007FF67FE99098
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA280C12_2_00007FF67FEA280C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9C77412_2_00007FF67FE9C774
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9170412_2_00007FF67FE91704
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE99ED012_2_00007FF67FE99ED0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE98E8C12_2_00007FF67FE98E8C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9DD8C12_2_00007FF67FE9DD8C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE8ED0012_2_00007FF67FE8ED00
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE98C8012_2_00007FF67FE98C80
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9E40C12_2_00007FF67FE9E40C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA237012_2_00007FF67FEA2370
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA02E012_2_00007FF67FEA02E0
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA6A6812_2_00007FF67FEA6A68
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E377A2C743_2_00007FF6E377A2C7
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37C293043_2_00007FF6E37C2930
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378AB8843_2_00007FF6E378AB88
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AB0B843_2_00007FF6E37AB0B8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E377200043_2_00007FF6E3772000
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37804B843_2_00007FF6E37804B8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A54E843_2_00007FF6E37A54E8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BC4FC43_2_00007FF6E37BC4FC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37C23E443_2_00007FF6E37C23E4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A742043_2_00007FF6E37A7420
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BD42843_2_00007FF6E37BD428
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AC36043_2_00007FF6E37AC360
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379937843_2_00007FF6E3799378
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B138843_2_00007FF6E37B1388
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E377E2C443_2_00007FF6E377E2C4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37782C743_2_00007FF6E37782C7
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A52E443_2_00007FF6E37A52E4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379A2F043_2_00007FF6E379A2F0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379B17843_2_00007FF6E379B178
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A58F843_2_00007FF6E37A58F8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BF91043_2_00007FF6E37BF910
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378793443_2_00007FF6E3787934
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379292C43_2_00007FF6E379292C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B387043_2_00007FF6E37B3870
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AC86C43_2_00007FF6E37AC86C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E377B7F443_2_00007FF6E377B7F4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378F80C43_2_00007FF6E378F80C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A782443_2_00007FF6E37A7824
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378B82C43_2_00007FF6E378B82C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AE7A043_2_00007FF6E37AE7A0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A67B443_2_00007FF6E37A67B4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37946B843_2_00007FF6E37946B8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A56F443_2_00007FF6E37A56F4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378265443_2_00007FF6E3782654
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BD6A443_2_00007FF6E37BD6A4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378C6AC43_2_00007FF6E378C6AC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B661043_2_00007FF6E37B6610
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A5D0843_2_00007FF6E37A5D08
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E3776BC443_2_00007FF6E3776BC4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E3798BE343_2_00007FF6E3798BE3
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E3781BE043_2_00007FF6E3781BE0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B0B4C43_2_00007FF6E37B0B4C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A5B0443_2_00007FF6E37A5B04
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AFB1043_2_00007FF6E37AFB10
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E3788B1443_2_00007FF6E3788B14
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BDA7843_2_00007FF6E37BDA78
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B6AA443_2_00007FF6E37B6AA4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B29BC43_2_00007FF6E37B29BC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37789CC43_2_00007FF6E37789CC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37AA9E443_2_00007FF6E37AA9E4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E3793A0C43_2_00007FF6E3793A0C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378EA2C43_2_00007FF6E378EA2C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37979B443_2_00007FF6E37979B4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37B712443_2_00007FF6E37B7124
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BB0B443_2_00007FF6E37BB0B4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37C2F3443_2_00007FF6E37C2F34
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E378CDE043_2_00007FF6E378CDE0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37C0E2043_2_00007FF6E37C0E20
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E377ED9043_2_00007FF6E377ED90
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF6ED881710 appears 57 times
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF6ED872330 appears 102 times
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: String function: 00007FF6ED8725A0 appears 405 times
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: String function: 00007FF6E3763B00 appears 46 times
Source: NW_store.exe.9.drStatic PE information: Number of sections : 13 > 10
Source: nw.dll.9.drStatic PE information: Number of sections : 15 > 10
Source: vk_swiftshader.dll.9.drStatic PE information: Number of sections : 11 > 10
Source: ffmpeg.dll.9.drStatic PE information: Number of sections : 11 > 10
Source: vulkan-1.dll.9.drStatic PE information: Number of sections : 11 > 10
Source: libEGL.dll.9.drStatic PE information: Number of sections : 12 > 10
Source: node.dll.9.drStatic PE information: Number of sections : 11 > 10
Source: nw_elf.dll.9.drStatic PE information: Number of sections : 14 > 10
Source: libGLESv2.dll.9.drStatic PE information: Number of sections : 12 > 10
Source: notification_helper.exe.9.drStatic PE information: Number of sections : 13 > 10
Source: Setup.exe, 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs Setup.exe
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
Source: classification engineClassification label: mal57.spyw.evad.winEXE@36/293@0/30
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED87A030 GetLastError,FormatMessageW,11_2_00007FF6ED87A030
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_00403640
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE8DB40 CreateToolhelp32Snapshot,Process32FirstW,CloseHandle,Concurrency::details::WorkQueue::IsStructuredEmpty,CloseHandle,Process32NextW,CloseHandle,12_2_00007FF67FE8DB40
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED912090 FindResourceExW,LoadResource,LockResource,SizeofResource,GlobalAlloc,GlobalLock,GlobalUnlock,CreateStreamOnHGlobal,GetLastError,11_2_00007FF6ED912090
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStoreJump to behavior
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97B.tmpJump to behavior
Source: Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Family,VirtualizationFirmwareEnabled FROM Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT sql FROM%d UNION ALL SELECT shell_add_schema(sql,mainNULL,name) AS sql, type, tbl_name, name, rowid, AS snum, AS sname FROM .sqlite_schema UNION ALL SELECT shell_module_schema(name), 'table', name, name, name, 9e+99, 'main' FROM pragma_module_list) WHERE %Qlower(printf('%s.%s',sname,tbl_name))lower(tbl_name) GLOB LIKE ESCAPE '\' AND name NOT LIKE 'sqlite_%%' AND sql IS NOT NULL ORDER BY snum, rowidSQL: %s;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: INSERT INTO sqlite_schema(type,name,tbl_name,rootpage,sql)VALUES('table','%q','%q',0,'%q');%s
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT max(length(key)) FROM temp.sqlite_parameters;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE ColNames( cpos INTEGER PRIMARY KEY, name TEXT, nlen INT, chop INT, reps INT, suff TEXT);CREATE VIEW RepeatedNames AS SELECT DISTINCT t.name FROM ColNames t WHERE t.name COLLATE NOCASE IN ( SELECT o.name FROM ColNames o WHERE o.cpos<>t.cpos);
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT type,name,tbl_name,sql FROM sqlite_schema ORDER BY name;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT key, quote(value) FROM temp.sqlite_parameters;
Source: chrome.exe, 00000003.00000002.3394035956.00006BB40286E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: CREATE TABLE psl_extensions (domain VARCHAR NOT NULL, UNIQUE (domain));
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT 'CREATE TEMP' || substr(sql, 7) FROM sqlite_schema WHERE tbl_name = %Q AND type IN ('table', 'trigger') ORDER BY type;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: INSERT INTO selftest(tno,op,cmd,ans) SELECT rowid*10,op,cmd,ans FROM [_shell$self];
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT * FROM "%w" ORDER BY rowid DESC;Warning: cannot step "%s" backwardsSELECT name, sql FROM sqlite_schema WHERE %sError: (%d) %s on [%s]
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: INSERT INTO sqlite_schema(type,name,tbl_name,rootpage,sql)VALUES('table','%q','%q',0,'%q');
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT * FROM "%w" ORDER BY rowid DESC;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT tbl,idx,stat FROM sqlite_stat1 ORDER BY tbl,idx;
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT 'EXPLAIN QUERY PLAN SELECT 1 FROM ' || quote(s.name) || ' WHERE ' || group_concat(quote(s.name) || '.' || quote(f.[from]) || '=?' || fkey_collate_clause( f.[table], COALESCE(f.[to], p.[name]), s.name, f.[from]),' AND '), 'SEARCH ' || s.name || ' USING COVERING INDEX*(' || group_concat('*=?', ' AND ') || ')', s.name || '(' || group_concat(f.[from], ', ') || ')', f.[table] || '(' || group_concat(COALESCE(f.[to], p.[name])) || ')', 'CREATE INDEX ' || quote(s.name ||'_'|| group_concat(f.[from], '_')) || ' ON ' || quote(s.name) || '(' || group_concat(quote(f.[from]) || fkey_collate_clause( f.[table], COALESCE(f.[to], p.[name]), s.name, f.[from]), ', ') || ');', f.[table] FROM sqlite_schema AS s, pragma_foreign_key_list(s.name) AS f LEFT JOIN pragma_table_info AS p ON (pk-1=seq AND p.arg=f.[table]) GROUP BY s.name, f.id ORDER BY (CASE WHEN ? THEN f.[table] ELSE s.name END)
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT 'CREATE TEMP' || substr(sql, 7) FROM sqlite_schema WHERE tbl_name = %Q AND type IN ('table', 'trigger') ORDER BY type;ALTER TABLE temp.%Q RENAME TO %QINSERT INTO %Q VALUES(, %s?)UPDATE %Q SET , %s%Q=?DELETE FROM %QSELECT type, name, sql, 1 FROM sqlite_schema WHERE type IN ('table','view') AND name NOT LIKE 'sqlite_%%' UNION ALL SELECT type, name, sql, 2 FROM sqlite_schema WHERE type = 'trigger' AND tbl_name IN(SELECT name FROM sqlite_schema WHERE type = 'view') ORDER BY 4, 1CREATE TABLE x(, %s%Q COLLATE %s)CREATE VIRTUAL TABLE %Q USING expert(%Q)SELECT max(i.seqno) FROM sqlite_schema AS s, pragma_index_list(s.name) AS l, pragma_index_info(l.name) AS i WHERE s.type = 'table', %sx.%Q IS rem(%d, x.%Q) COLLATE %s%s%dSELECT %s FROM %Q x ORDER BY %sSELECT %s FROM temp.t592690916721053953805701627921227776 x ORDER BY %s%d %dDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776CREATE TABLE temp.t592690916721053953805701627921227776 AS SELECT * FROM %QSELECT s.rowid, s.name, l.name FROM sqlite_schema AS s, pragma_index_list(s.name) AS l WHERE s.type = 'table'SELECT name, coll FROM pragma_index_xinfo(?) WHERE keyINSERT INTO sqlite_stat1 VALUES(?, ?, ?)ANALYZE; PRAGMA writable_schema=1remsampleDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776ANALYZE sqlite_schemaDROP TABLE IF EXISTS temp.t592690916721053953805701627921227776:memory::memory:SELECT sql FROM sqlite_schema WHERE name NOT LIKE 'sqlite_%%' AND sql NOT LIKE 'CREATE VIRTUAL %%'Cannot find a unique index name to propose. -- stat1: %s;%s%s
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: INSERT OR IGNORE INTO "%s" VALUES(?,?);Error %d: %s on [%s]
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000000.2745062614.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871503547.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844151384.00007FF6EDB12000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: SELECT name,seq FROM sqlite_sequence ORDER BY name;
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\user\Desktop\Setup.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe"
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa.1091y&nocache=20241101130519.339&_fcid=1728941759157143
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\nspF85F.tmp "C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PcAppStore.exe" /init default
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess created: C:\Users\user\PCAppStore\Watchdog.exe "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091y
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\AutoUpdater.exe "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa.1091y&nocache=20241101130519.339&_fcid=1728941759157143Jump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\nspF85F.tmp "C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /forceJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Users\user\PCAppStore\Watchdog.exe "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091yJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Users\user\AppData\Local\Temp\nspF85F.tmp "C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /forceJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PcAppStore.exe" /init default Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess created: C:\Users\user\PCAppStore\Watchdog.exe "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091yJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\PcAppStore.exe "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
Source: C:\Windows\explorer.exeProcess created: C:\Users\user\PCAppStore\AutoUpdater.exe "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Windows\explorer.exeProcess created: unknown unknown
Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: uiamanager.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: apphelp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: urlmon.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: winhttp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: iertutil.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: srvcli.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: netutils.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: windows.storage.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: wldp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: uxtheme.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: wininet.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: sspicli.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: profapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: mswsock.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: winnsi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: dnsapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: rasadhlp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: fwpuclnt.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: schannel.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: mskeyprotect.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ntasn1.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: msasn1.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: dpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: cryptsp.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: rsaenh.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: cryptbase.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: gpapi.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ncrypt.dll
Source: C:\Users\user\PCAppStore\Watchdog.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dll
Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dll
Source: C:\Windows\explorer.exeSection loaded: provsvc.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: msvcp140.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: urlmon.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: version.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wlanapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: winhttp.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: dwmapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wtsapi32.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: secur32.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: iertutil.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: srvcli.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: netutils.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: profapi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: sspicli.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: wbemcomn.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: amsi.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: userenv.dll
Source: C:\Users\user\PCAppStore\PcAppStore.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: uiautomationcore.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeSection loaded: oleacc.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: apphelp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: urlmon.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: winhttp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: iertutil.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: srvcli.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: netutils.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: wbemcomn.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: amsi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: userenv.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: profapi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: webio.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: mswsock.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: winnsi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: sspicli.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: dnsapi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: rasadhlp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: fwpuclnt.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: schannel.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: mskeyprotect.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: ntasn1.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: ncrypt.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: ncryptsslp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: msasn1.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: cryptsp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: rsaenh.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: cryptbase.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: gpapi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: dpapi.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: uxtheme.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: wininet.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: windows.storage.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: wldp.dll
Source: C:\Users\user\PCAppStore\AutoUpdater.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Desktop\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: PC App Store.lnk.9.drLNK file: ..\..\..\..\..\..\PCAppStore\PcAppStore.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStoreJump to behavior
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\user\Release\PCAppStore.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844079351.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000002.2871374440.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\AppStoreUpdater\Release\auto_updater.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2979428452.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp, AutoUpdater.exe, 0000002B.00000000.2926794853.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qUkmMBjREGieFqRs.exe, 0000000F.00000000.2821420153.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000011.00000002.3344787561.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000012.00000000.2827845004.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000013.00000002.3342755033.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000014.00000000.2837813223.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000015.00000002.3344282929.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000017.00000000.2863272471.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000018.00000002.3343611148.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000019.00000000.2880863784.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001A.00000002.3344606796.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001B.00000000.2893024947.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001C.00000002.3343936895.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001D.00000000.2896892191.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001E.00000000.2899562250.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000001F.00000000.2901727156.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000020.00000002.3347546003.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000021.00000000.2905603857.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000022.00000000.2907322241.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000023.00000002.3345223750.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000024.00000000.2917264974.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000025.00000000.2918252898.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000026.00000000.2919162014.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000027.00000002.3344628363.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000028.00000000.2921297630.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 00000029.00000002.3343075972.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp, qUkmMBjREGieFqRs.exe, 0000002A.00000002.3344456864.00000000001DE000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\Watchdog\x64\Release\Watchdog.pdb source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000000.2745424571.00007FF67FEAA000.00000002.00000001.01000000.00000017.sdmp, Watchdog.exe, 0000000C.00000002.3364961673.00007FF67FEAA000.00000002.00000001.01000000.00000017.sdmp
Source: Binary string: C:\Build\Build_1091y_D20240917T140126\fa_rss\AppStoreUpdater\Release\auto_updater.pdb1 source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2979428452.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp, AutoUpdater.exe, 0000002B.00000000.2926794853.00007FF6E37CA000.00000002.00000001.01000000.0000001C.sdmp
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8CC810 atomic,RoGetActivationFactory,atomic,LoadLibraryW,GetProcAddress,RoGetActivationFactory,atomic,atomic,type_info::_name_internal_method,Concurrency::details::WorkQueue::IsStructuredEmpty,LoadLibraryW,Concurrency::details::_Scheduler::_Scheduler,GetProcAddress,atomic,11_2_00007FF6ED8CC810
Source: Setup.exeStatic PE information: real checksum: 0x315f6 should be: 0x3c395
Source: NW_store.exe.9.drStatic PE information: real checksum: 0x0 should be: 0x23ab08
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x3d68
Source: System.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x3d68
Source: vk_swiftshader.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x44caa7
Source: ffmpeg.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x1f8136
Source: nsJSON.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x6718
Source: NSISFastLib.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x30512
Source: inetc.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x13c41
Source: vulkan-1.dll.9.drStatic PE information: real checksum: 0x0 should be: 0xe0b14
Source: libEGL.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x7ddc6
Source: nsJSON.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x6718
Source: Math.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x155a8
Source: nw_elf.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x124d11
Source: NSISFastLib.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x30512
Source: inetc.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x13c41
Source: libGLESv2.dll.9.drStatic PE information: real checksum: 0x0 should be: 0x7b9652
Source: notification_helper.exe.9.drStatic PE information: real checksum: 0x0 should be: 0x11edb8
Source: nsDialogs.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x2f9b
Source: NW_store.exe.9.drStatic PE information: section name: .gxfg
Source: NW_store.exe.9.drStatic PE information: section name: .retplne
Source: NW_store.exe.9.drStatic PE information: section name: .voltbl
Source: NW_store.exe.9.drStatic PE information: section name: CPADinfo
Source: NW_store.exe.9.drStatic PE information: section name: _RDATA
Source: NW_store.exe.9.drStatic PE information: section name: malloc_h
Source: ffmpeg.dll.9.drStatic PE information: section name: .gxfg
Source: ffmpeg.dll.9.drStatic PE information: section name: .retplne
Source: ffmpeg.dll.9.drStatic PE information: section name: .voltbl
Source: ffmpeg.dll.9.drStatic PE information: section name: _RDATA
Source: libEGL.dll.9.drStatic PE information: section name: .gxfg
Source: libEGL.dll.9.drStatic PE information: section name: .retplne
Source: libEGL.dll.9.drStatic PE information: section name: .voltbl
Source: libEGL.dll.9.drStatic PE information: section name: _RDATA
Source: libEGL.dll.9.drStatic PE information: section name: malloc_h
Source: libGLESv2.dll.9.drStatic PE information: section name: .gxfg
Source: libGLESv2.dll.9.drStatic PE information: section name: .retplne
Source: libGLESv2.dll.9.drStatic PE information: section name: .voltbl
Source: libGLESv2.dll.9.drStatic PE information: section name: _RDATA
Source: libGLESv2.dll.9.drStatic PE information: section name: malloc_h
Source: node.dll.9.drStatic PE information: section name: .gxfg
Source: node.dll.9.drStatic PE information: section name: .retplne
Source: node.dll.9.drStatic PE information: section name: .voltbl
Source: node.dll.9.drStatic PE information: section name: _RDATA
Source: notification_helper.exe.9.drStatic PE information: section name: .gxfg
Source: notification_helper.exe.9.drStatic PE information: section name: .retplne
Source: notification_helper.exe.9.drStatic PE information: section name: .voltbl
Source: notification_helper.exe.9.drStatic PE information: section name: CPADinfo
Source: notification_helper.exe.9.drStatic PE information: section name: _RDATA
Source: notification_helper.exe.9.drStatic PE information: section name: malloc_h
Source: nw.dll.9.drStatic PE information: section name: .gxfg
Source: nw.dll.9.drStatic PE information: section name: .retplne
Source: nw.dll.9.drStatic PE information: section name: .rodata
Source: nw.dll.9.drStatic PE information: section name: .voltbl
Source: nw.dll.9.drStatic PE information: section name: CPADinfo
Source: nw.dll.9.drStatic PE information: section name: LZMADEC
Source: nw.dll.9.drStatic PE information: section name: _RDATA
Source: nw.dll.9.drStatic PE information: section name: malloc_h
Source: nw_elf.dll.9.drStatic PE information: section name: .crthunk
Source: nw_elf.dll.9.drStatic PE information: section name: .gxfg
Source: nw_elf.dll.9.drStatic PE information: section name: .retplne
Source: nw_elf.dll.9.drStatic PE information: section name: .voltbl
Source: nw_elf.dll.9.drStatic PE information: section name: CPADinfo
Source: nw_elf.dll.9.drStatic PE information: section name: _RDATA
Source: nw_elf.dll.9.drStatic PE information: section name: malloc_h
Source: vk_swiftshader.dll.9.drStatic PE information: section name: .gxfg
Source: vk_swiftshader.dll.9.drStatic PE information: section name: .retplne
Source: vk_swiftshader.dll.9.drStatic PE information: section name: .voltbl
Source: vk_swiftshader.dll.9.drStatic PE information: section name: _RDATA
Source: vulkan-1.dll.9.drStatic PE information: section name: .gxfg
Source: vulkan-1.dll.9.drStatic PE information: section name: .retplne
Source: vulkan-1.dll.9.drStatic PE information: section name: .voltbl
Source: vulkan-1.dll.9.drStatic PE information: section name: _RDATA
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8CF8E0 pushfq ; ret 11_2_00007FF6ED8CF8E1
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37704D0 GetTickCount,Concurrency::details::WorkQueue::IsStructuredEmpty,Concurrency::details::WorkQueue::IsStructuredEmpty,URLDownloadToFileW,ShellExecuteExW,WaitForSingleObject,CloseHandle,43_2_00007FF6E37704D0
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\Watchdog.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\libEGL.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\ffmpeg.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\node.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\nw.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\vulkan-1.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\Math.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\Uninstaller.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\nw_elf.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\PcAppStore.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\AutoUpdater.exeJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nspF85F.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\libGLESv2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.LICENSE.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\PCAppStore\ReadMe.txtJump to behavior

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PCAppStoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WatchdogJump to behavior
Source: C:\Users\user\Desktop\Setup.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\Setup.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\PCAppStore\PcAppStore.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\PCAppStore\AutoUpdater.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 300000
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 373Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 672Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 953Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: threadDelayed 2171Jump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeWindow / User API: foregroundWindowGot 446Jump to behavior
Source: C:\Users\user\PCAppStore\Watchdog.exeWindow / User API: threadDelayed 371
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\nw.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\vulkan-1.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\Math.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\libEGL.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\Uninstaller.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\ffmpeg.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\nw_elf.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\NW_store.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\node.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\notification_helper.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\libGLESv2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpDropped PE file which has not been started: C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dllJump to dropped file
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 7320Thread sleep count: 371 > 30
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 7320Thread sleep time: -22260000s >= -30000s
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 7244Thread sleep time: -1200000s >= -30000s
Source: C:\Users\user\PCAppStore\Watchdog.exe TID: 7320Thread sleep time: -60000s >= -30000s
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT HypervisorPresent FROM Win32_ComputerSystem
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct
Source: C:\Users\user\PCAppStore\PcAppStore.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystemProduct
Source: C:\Users\user\PCAppStore\PcAppStore.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystemProduct
Source: C:\Users\user\PCAppStore\AutoUpdater.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Family,VirtualizationFirmwareEnabled FROM Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\PCAppStore\Watchdog.exeLast function: Thread delayed
Source: C:\Users\user\PCAppStore\Watchdog.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_00405D74
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_0040699E FindFirstFileW,FindClose,9_2_0040699E
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpCode function: 9_2_0040290B FindFirstFileW,9_2_0040290B
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67A88 FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,11_2_00007FF6EDA67A88
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67B38 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,11_2_00007FF6EDA67B38
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE91690 FindClose,FindFirstFileExW,GetLastError,12_2_00007FF67FE91690
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE91704 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,12_2_00007FF67FE91704
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA02E0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00007FF67FEA02E0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E376D890 wsprintfW,FindFirstFileW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,43_2_00007FF6E376D890
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37BDA78 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_00007FF6E37BDA78
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 60000
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 300000
Source: C:\Users\user\PCAppStore\Watchdog.exeThread delayed: delay time: 60000
Source: chrome.exe, 00000003.00000002.3387218344.00006BB402260000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
Source: PcAppStore.exe, 0000000B.00000002.3365609480.000002A10B186000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWv
Source: explorer.exe, 0000000D.00000000.2776598331.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3379960546.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
Source: Setup.exe, 00000000.00000003.2102120601.00000000005FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _stem_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry",
Source: explorer.exe, 0000000D.00000003.2981026303.000000000C374000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: AutoUpdater.exe, 0000002B.00000003.2931265676.0000013607C1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
Source: AutoUpdater.exe, 0000002B.00000002.2977343215.0000013607C64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@~
Source: explorer.exe, 0000000D.00000003.2981291376.000000000C3FD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 0000000D.00000003.3078724892.000000000C3ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 8-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
Source: explorer.exe, 0000000D.00000003.3075061393.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
Source: chrome.exe, 00000003.00000002.3405174031.00006BB4031CC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual USB Mouse
Source: explorer.exe, 0000000D.00000000.2751980849.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 0000000D.00000003.3078724892.000000000C3ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 1efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@[
Source: Setup.exe, 00000000.00000002.2376129578.0000000002BB0000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904637840.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2902835115.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.00000000005CA000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3365609480.000002A10B1AD000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3365609480.000002A10B1FF000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3365609480.000002A10B22C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000003.3184789136.00000274E389C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000002.3352175954.00000274E389C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000003.3155648167.00000274E389C000.00000004.00000020.00020000.00000000.sdmp, Watchdog.exe, 0000000C.00000003.3126246930.00000274E389C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Setup.exe, 00000000.00000003.2101789896.00000000005FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _stem_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device",
Source: nspF85F.tmp, 00000009.00000003.2902835115.0000000000583000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.0000000000583000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904637840.0000000000583000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
Source: nspF85F.tmp, 00000009.00000002.2904637840.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2902835115.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.00000000005CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
Source: Setup.exe, 00000000.00000003.2098909377.00000000005EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware%2C+Inc%2E
Source: explorer.exe, 0000000D.00000002.3369946069.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: chrome.exe, 00000003.00000002.3406088661.00006BB40327C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: USB device added: path=\\?\usb#vid_0e0f&pid_0003#5&2dda038&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} vendor=3599 "VMware", product=3 "VMware Virtual USB Mouse", serial="", driver="usbccgp", guid=78e3da94-58a6-446c-8dcd-deca53bf0080
Source: tempPOSTData.9.drBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry","4":"RuntimeBroker%2Eexe","5":"SearchApp%2Eexe","6":"SgrmBroker%2Eexe","7":"StartMenuExperienceHost%2Eexe","8":"System","9":"TextInputHost%2Eexe","10":"WMIADAP%2Eexe","11":"WinStore%2EApp%2Eexe","12":"WmiPrvSE%2Eexe","13":"%5BSystem+Process%5D","14":"chrome%2Eexe","15":"conhost%2Eexe","16":"csrss%2Eexe","17":"ctfmon%2Eexe","18":"dasHost%2Eexe","19":"dllhost%2Eexe","20":"dwm%2Eexe","21":"explorer%2Eexe","22":"fontdrvhost%2Eexe","23":"lsass%2Eexe","24":"nspF85F%2Etmp","25":"qUkmMBjREGieFqRs%2Eexe","26":"services%2Eexe","27":"sihost%2Eexe","28":"smartscreen%2Eexe","29":"smss%2Eexe","30":"spoolsv%2Eexe","31":"svchost%2Eexe","32":"wininit%2Eexe","33":"winlogon%2Eexe"}}
Source: chrome.exe, 00000003.00000002.3372015942.000001FDB383B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Watchdog.exe, 0000000C.00000002.3352175954.00000274E3823000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc
Source: AutoUpdater.exe, 0000002B.00000003.2931265676.0000013607C1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System Product542CGZ4D802742-3099-9C0E-C19B-2A23EA1FC420VMware, Inc.Noney*
Source: explorer.exe, 0000000D.00000003.3075061393.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: explorer.exe, 0000000D.00000002.3382166791.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 0000000D.00000002.3379960546.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.2776598331.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
Source: Setup.exe, 00000000.00000003.2098473428.00000000005BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LstringVMware, Inc.4
Source: Setup.exe, 00000000.00000003.2102408874.00000000005CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "pc_vendor":"VMware%2C+Inc%2E",n
Source: Setup.exe, 00000000.00000003.2102501754.0000000000640000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry","4":"RuntimeBroker%2Eexe","5":"SearchApp%2Eexe","6":"Setup%2Eexe","7":"SgrmBroker%2Eexe","8":"StartMenuExperienceHost%2Eexe","9":"System","10":"TextInputHost%2Eexe","11":"WinStore%2EApp%2Eexe","12":"WmiPrvSE%2Eexe","13":"%5BSystem+Process%5D","14":"backgroundTaskHost%2Eexe","15":"conhost%2Eexe","16":"csrss%2Eexe","17":"ctfmon%2Eexe","18":"dasHost%2Eexe","19":"dllhost%2Eexe","20":"dwm%2Eexe","21":"explorer%2Eexe","22":"fontdrvhost%2Eexe","23":"lsass%2Eexe","24":"qUkmMBjREGieFqRs%2Eexe","25":"services%2Eexe","26":"sihost%2Eexe","27":"smartscreen%2Eexe","28":"smss%2Eexe","29":"spoolsv%2Eexe","30":"sppsvc%2Eexe","31":"svchost%2Eexe","32":"upfc%2Eexe","33":"wininit%2Eexe","34":"winlogon%2Eexe"},"sys_lang":"en-GB","parent_proc":"explorer%2Eexe"}
Source: Setup.exe, 00000000.00000003.2102040456.000000000061E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _stem_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration",
Source: explorer.exe, 0000000D.00000002.3379960546.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: PcAppStore.exe, 00000016.00000002.2866379681.000002626EEBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
Source: explorer.exe, 0000000D.00000000.2751980849.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
Source: Setup.exe, 00000000.00000003.2102501754.000000000062F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `stem_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry","4":"RuntimeBroker%2Eexe","5":"SearchApp%2Eexe","6":"Setup%2Eexe","7":"SgrmBroker%2Eexe","8":"StartMenuExperienceHost%2Eexe","9":"System","10":"TextInputHost%2Eexe","11":"WinStore%2EApp%2Eexe","12":"WmiPrvSE%2Eexe","13":"%5BSystem+Process%5D","14":"backgroundTaskHost%2Eexe","15":"conhost%2Eexe","16":"csrss%2Eexe","17":"ctfmon%2Eexe","18":"dasHost%2Eexe","19":"dllhost%2Eexe","20":"dwm%2Eexe","21":"explorer%2Eexe","22":"fontdrvhost%2Eexe","23":"lsass%2Eexe","24":"qUkmMBjREGieFqRs%2Eexe","25":"services%2Eexe","26":"sihost%2Eexe",
Source: Setup.exe, 00000000.00000003.2101717291.000000000061E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29",
Source: Setup.exe, 00000000.00000003.2102311428.00000000005FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: astem_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry",
Source: explorer.exe, 0000000D.00000003.3075061393.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
Source: Setup.exe, 00000000.00000003.2102040456.000000000062F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"Memory+Compression","2":"OfficeClickToRun%2Eexe","3":"Registry","4":"RuntimeBroker%2Eexe","5":"SearchApp%2Eexe","6":"Setup%2Eexe","7":"SgrmBroker%2Eexe","8":"StartMenuExperienceHost%2Eexe","9":"System","10":"TextInputHost%2Eexe","11":"WinStore%2EApp%2Eexe","12":"WmiPrvSE%2Eexe",
Source: Setup.exe, 00000000.00000003.2129137714.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2375576791.00000000005EC000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2374808583.00000000005EC000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2153324620.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2118856876.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2153164892.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2132485262.00000000005F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
Source: nspF85F.tmp, 00000009.00000003.2902835115.000000000059A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware%2C+Inc%2EU
Source: PcAppStore.exe, 0000000B.00000002.3367862742.000002A10D7EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: PcAppStore.exe, 00000016.00000003.2853347121.000002626EEEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System Product542CGZ4D802742-3099-9C0E-C19B-2A23EA1FC420VMware, Inc.None+
Source: explorer.exe, 0000000D.00000000.2751980849.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: AutoUpdater.exe, 0000002B.00000003.2931265676.0000013607C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System Product542CGZ4D802742-3099-9C0E-C19B-2A23EA1FC420VMware, Inc.None
Source: explorer.exe, 0000000D.00000000.2751980849.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-3503
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpAPI call chain: ExitProcess graph end nodegraph_9-3481
Source: C:\Users\user\Desktop\Setup.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA61784 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,11_2_00007FF6EDA61784
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA61784 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,11_2_00007FF6EDA61784
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8CC810 atomic,RoGetActivationFactory,atomic,LoadLibraryW,GetProcAddress,RoGetActivationFactory,atomic,atomic,type_info::_name_internal_method,Concurrency::details::WorkQueue::IsStructuredEmpty,LoadLibraryW,Concurrency::details::_Scheduler::_Scheduler,GetProcAddress,atomic,11_2_00007FF6ED8CC810
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8E6EC0 GetProcessHeap,HeapFree,11_2_00007FF6ED8E6EC0
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA83E20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00007FF6EDA83E20
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA89148 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00007FF6EDA89148
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE92F8C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FF67FE92F8C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE97E58 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FF67FE97E58
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE9250C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00007FF67FE9250C
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FE93170 SetUnhandledExceptionFilter,12_2_00007FF67FE93170
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379DC0C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_00007FF6E379DC0C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379DFE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_00007FF6E379DFE0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E37A2FA8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_00007FF6E37A2FA8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: 43_2_00007FF6E379DDF0 SetUnhandledExceptionFilter,43_2_00007FF6E379DDF0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtOpenSection: Direct from: 0x77382E0C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtMapViewOfSection: Direct from: 0x77382D1C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtReadVirtualMemory: Direct from: 0x77382E8C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtProtectVirtualMemory: Direct from: 0x77382F9C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtClose: Direct from: 0x77382B6C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtCreateMutant: Direct from: 0x773835CC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtQueryAttributesFile: Direct from: 0x77382E6C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtSetInformationProcess: Direct from: 0x77382C5C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtQueryInformationProcess: Direct from: 0x77382C26
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtTerminateThread: Direct from: 0x77382FCC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtSetInformationThread: Direct from: 0x77382ECC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtOpenKeyEx: Direct from: 0x77382B9C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtOpenKeyEx: Direct from: 0x77383C9C
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtQueryValueKey: Direct from: 0x77382BEC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtDeviceIoControlFile: Direct from: 0x77382AEC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtAllocateVirtualMemory: Direct from: 0x77382BFC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtCreateFile: Direct from: 0x77382FEC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtOpenFile: Direct from: 0x77382DCC
Source: C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exeNtAddAtomEx: Direct from: 0x7738312C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6ED8F5960 keybd_event,keybd_event,11_2_00007FF6ED8F5960
Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa.1091y&nocache=20241101130519.339&_fcid=1728941759157143Jump to behavior
Source: chrome.exe, 00000003.00000002.3373926679.000001FDB41E0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.2753008330.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.3359049526.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
Source: PcAppStore.exe, 0000000B.00000002.3367862742.000002A10D7EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: chrome.exe, 00000003.00000002.3373926679.000001FDB41E0000.00000002.00000001.00040000.00000000.sdmp, PcAppStore.exe, PcAppStore.exe, 0000000B.00000003.2950355546.000002A10D846000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.2950232567.000002A10D832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: productui_creation_failedcreation_error=%wsui_termination_errordirectory_switching_error.\nwjs\NW_store.exe.\ui\.ENDING_EVT_HANDLERWindows Default Lock ScreenLocalPCAppStore\productsystem_eventmsg=shutdownshutdownproductsystem_eventmsg=logofflogoff{"app":{"menu_search":{"search_request":"", "page":"b"},"show_window": "menu_search"}}ClosingEventproducttaskbar_handler_erroreCode=%luShell_TrayWndStartTrayDummySearchControlTrayButton
Source: chrome.exe, 00000003.00000002.3373926679.000001FDB41E0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.2753008330.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.3359049526.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: list too longStartMenuExperienceHost.exeShellExperienceHost.exeexplorer.exeSearchApp.exeSearchUI.exeSearchHost.exe{"app":{"menu_search":{"search_request":"", "page":"a", "top":%d,"left":%d,"bottom":%d,"right":%d},"show_window": "menu_search"}}{"app": {"hide_window": "menu_search"}}Shell_TrayWndStartTrayDummySearchControlTrayButton
Source: PcAppStore.exe, 0000000B.00000003.2950355546.000002A10D846000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.2950232567.000002A10D832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnded.
Source: explorer.exe, 0000000D.00000002.3346747565.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.2751980849.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
Source: PcAppStore.exe, 0000000B.00000003.2950355546.000002A10D846000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.2950232567.000002A10D832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd/
Source: chrome.exe, 00000003.00000002.3373926679.000001FDB41E0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.2753008330.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.3359049526.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Arial+++NWidgetShell_TrayWndTrayNotifyWndTrayButtonPNG i)@
Source: explorer.exe, 0000000D.00000000.2780304320.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000003.2979242819.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3382166791.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: TTaskbarShell_TrayWnd{"app": {"init":{"direction":"%c","screen_size":{"with_topbar":%d,"t":%d,"l":%d,"b":%d,"r":%d}}}}
Source: nspF85F.tmp, 00000009.00000002.2905429322.0000000002875000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: unknowninfnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)unknownLTRRTLLTRinfnan(ind)nannan(snan)infnan(ind)nannan(snan)type must be string, but is type must be number, but is type must be number, but is \\\HKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_CURRENT_CONFIGCurrentBuildBuildNumberSOFTWARE\Microsoft\Windows NT\CurrentVersionSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon%lu%02X\/Software\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\RunSoftware\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\RunSoftware\PCAppStoreAppParamdefaultauto_start_oncontextual_offersperiodical_offerspersonilized_notifications%us%5B%5D=\uparamsnametype must be string, but is paramsnameurloidentryAppfilePath0e+000e+00^(https?://(?:www.)?([^/]+))(/.*)?$URL format is not valid : %wsWinHTTP 1.0handle initialization failuretimeout init failureRoGetActivationFactorycombase.dllhandle connection failureGETCoIncrementMTAUsagecombase.dllhandle request creation failure.dllDllGetActivationFactoryhandle request or response failurefile creation failurequery data not availableurloidlastTimeoTypesessionIdtagretmessageRoGetActivationFactorycombase.dllCoIncrementMTAUsagecombase.dll.dllDllGetActivationFactoryiconnamepathoidanimationsoundmenu_storemenu_searchhttps://pcapp.storenamepathmicrosoftIdregpathkeydisplaycountblinkingnotificationIconrunParampathalt_linkmicrosoftIdregpathkeyidwinGetParamsaltActionaltActionParamsidC++/WinRT version:2.0.220110.5productr_binErreCode=%dproductcreate_shortcutshortcut_erroroid=%luSHGetFolderPath_error_code=%X&oid=%luQueryInterface_error_code=%X&oid=%luCoCreateInstance_error_code=%X&oid=%lu.lnknfinity.lnkanproductshortcut_delete_erroreC=%XindsnannfinityanindsnanShell_TrayWnd0p+00p+08
Source: PcAppStore.exe, 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 0000000B.00000000.2745002770.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmp, PcAppStore.exe, 00000016.00000000.2844079351.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: Arial+++NWidgetShell_TrayWndTrayNotifyWndTrayButtonPNG i
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: 12_2_00007FF67FEA6780 cpuid 12_2_00007FF67FEA6780
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoEx,FormatMessageA,11_2_00007FF6EDA66D40
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_00007FF6EDAAED78
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_00007FF6EDAAEF5C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: EnumSystemLocalesW,11_2_00007FF6EDAAE940
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: EnumSystemLocalesW,11_2_00007FF6EDAAE870
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoEx,11_2_00007FF6EDA8284C
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,11_2_00007FF6EDAAE514
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoEx,Concurrency::details::WorkQueue::IsStructuredEmpty,GetLocaleInfoEx,11_2_00007FF6ED8E8410
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: GetLocaleInfoW,11_2_00007FF6EDAA3C74
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: EnumSystemLocalesW,11_2_00007FF6EDAA36DC
Source: C:\Users\user\PCAppStore\Watchdog.exeCode function: GetLocaleInfoEx,FormatMessageA,12_2_00007FF67FE913F8
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,43_2_00007FF6E37C13B0
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,43_2_00007FF6E37C1874
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: EnumSystemLocalesW,43_2_00007FF6E37C17DC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoEx,43_2_00007FF6E379C6BC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: EnumSystemLocalesW,43_2_00007FF6E37C170C
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoW,43_2_00007FF6E37C1CC4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,43_2_00007FF6E37C1C14
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: EnumSystemLocalesW,43_2_00007FF6E37B7B74
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoW,43_2_00007FF6E37C1ABC
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: GetLocaleInfoW,43_2_00007FF6E37B80B4
Source: C:\Users\user\PCAppStore\AutoUpdater.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,43_2_00007FF6E37C1DF8
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDA67FB4 GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,11_2_00007FF6EDA67FB4
Source: C:\Users\user\PCAppStore\PcAppStore.exeCode function: 11_2_00007FF6EDAA826C _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,11_2_00007FF6EDAA826C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\nspF85F.tmpWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct

Stealing of Sensitive Information

barindex
Source: C:\Users\user\PCAppStore\PcAppStore.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesJump to behavior
Source: sr.pak.info.9.drBinary or memory string: IDS_WIN_8_1_OBSOLETE,943,../../chrome/app/chromium_strings.grd
Source: sr.pak.info.9.drBinary or memory string: IDS_WIN_XP_VISTA_OBSOLETE,940,../../chrome/app/chromium_strings.grd
Source: sr.pak.info.9.drBinary or memory string: IDS_WIN_8_OBSOLETE,942,../../chrome/app/chromium_strings.grd
Source: sr.pak.info.9.drBinary or memory string: IDS_WIN_7_OBSOLETE,941,../../chrome/app/chromium_strings.grd
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts141
Windows Management Instrumentation
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Deobfuscate/Decode Files or Information
1
OS Credential Dumping
2
System Time Discovery
Remote Services1
Archive Collected Data
21
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Search Order Hijacking
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Input Capture
2
File and Directory Discovery
Remote Desktop Protocol1
Data from Local System
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Windows Service
1
DLL Search Order Hijacking
2
Obfuscated Files or Information
Security Account Manager156
System Information Discovery
SMB/Windows Admin Shares1
Input Capture
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron111
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
DLL Side-Loading
NTDS1
Query Registry
Distributed Component Object Model1
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Windows Service
1
DLL Search Order Hijacking
LSA Secrets261
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
Process Injection
1
Masquerading
Cached Domain Credentials141
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items111
Registry Run Keys / Startup Folder
141
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1546932 Sample: Setup.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 57 84 Malicious sample detected (through community Yara rule) 2->84 86 Multi AV Scanner detection for dropped file 2->86 88 Machine Learning detection for sample 2->88 9 Setup.exe 2 42 2->9         started        process3 dnsIp4 78 169.150.255.181 SPIRITTEL-ASUS United States 9->78 80 64.176.203.93 ALABANZA-BALTUS United States 9->80 46 C:\Users\user\AppData\Local\...\nspF85F.tmp, PE32 9->46 dropped 48 C:\Users\user\AppData\Local\...\nsJSON.dll, PE32 9->48 dropped 50 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 9->50 dropped 52 3 other files (none is malicious) 9->52 dropped 92 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 9->92 14 nspF85F.tmp 11 252 9->14         started        18 chrome.exe 1 9->18         started        file5 signatures6 process7 dnsIp8 54 C:\Users\user\PCAppStore\nwjs\vulkan-1.dll, PE32+ 14->54 dropped 56 C:\Users\user\...\vk_swiftshader.dll, PE32+ 14->56 dropped 58 C:\Users\user\PCAppStore\nwjs\nw_elf.dll, PE32+ 14->58 dropped 60 17 other files (11 malicious) 14->60 dropped 94 Multi AV Scanner detection for dropped file 14->94 96 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 14->96 98 Creates multiple autostart registry keys 14->98 21 PcAppStore.exe 3 14->21         started        25 Watchdog.exe 14->25         started        62 192.168.2.23 unknown unknown 18->62 64 192.168.2.6 unknown unknown 18->64 66 239.255.255.250 unknown Reserved 18->66 27 chrome.exe 18->27         started        29 chrome.exe 18->29         started        31 chrome.exe 6 18->31         started        file9 signatures10 process11 dnsIp12 68 147.182.211.77 BV-PUBLIC-ASNUS United States 21->68 90 Tries to harvest and steal browser information (history, passwords, etc) 21->90 33 qUkmMBjREGieFqRs.exe 21->33 injected 36 explorer.exe 21->36 injected 38 qUkmMBjREGieFqRs.exe 21->38 injected 40 24 other processes 21->40 70 18.173.205.117 MIT-GATEWAYSUS United States 25->70 72 207.211.211.27 NAVISITE-EAST-2US United States 27->72 74 142.250.184.200 GOOGLEUS United States 27->74 76 21 other IPs or domains 27->76 signatures13 process14 signatures15 82 Found direct / indirect Syscall (likely to bypass EDR) 33->82 42 PcAppStore.exe 36->42         started        44 AutoUpdater.exe 36->44         started        process16

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Setup.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\Math.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\NSISFastLib.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\nsJSON.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\NSISFastLib.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsDialogs.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\nsJSON.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nspF85F.tmp21%ReversingLabs
C:\Users\user\PCAppStore\AutoUpdater.exe5%ReversingLabs
C:\Users\user\PCAppStore\PcAppStore.exe3%ReversingLabs
C:\Users\user\PCAppStore\Uninstaller.exe26%ReversingLabs
C:\Users\user\PCAppStore\Watchdog.exe8%ReversingLabs
C:\Users\user\PCAppStore\nwjs\NW_store.exe0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\ffmpeg.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\libEGL.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\libGLESv2.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\node.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\notification_helper.exe0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\nw.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\nw_elf.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dll0%ReversingLabs
C:\Users\user\PCAppStore\nwjs\vulkan-1.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://duckduckgo.com/ac/?q=0%URL Reputationsafe
https://issuetracker.google.com/2844622630%URL Reputationsafe
https://anglebug.com/77140%URL Reputationsafe
http://anglebug.com/62480%URL Reputationsafe
http://anglebug.com/52810%URL Reputationsafe
https://issuetracker.google.com/2554117480%URL Reputationsafe
https://anglebug.com/72460%URL Reputationsafe
https://anglebug.com/73690%URL Reputationsafe
https://anglebug.com/74890%URL Reputationsafe
https://issuetracker.google.com/1619030060%URL Reputationsafe
http://anglebug.com/75530%URL Reputationsafe
http://anglebug.com/53710%URL Reputationsafe
http://anglebug.com/75560%URL Reputationsafe
https://chromewebstore.google.com/0%URL Reputationsafe
http://anglebug.com/66920%URL Reputationsafe
https://issuetracker.google.com/2582074030%URL Reputationsafe
http://anglebug.com/36230%URL Reputationsafe
http://anglebug.com/36250%URL Reputationsafe
http://anglebug.com/36240%URL Reputationsafe
http://anglebug.com/50070%URL Reputationsafe
http://anglebug.com/38620%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://mail.google.com/mail/?usp=installed_webappchrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
    unknown
    https://duckduckgo.com/ac/?q=chrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditingchrome.exe, 00000003.00000002.3387459126.00006BB402278000.00000004.00000001.00020000.00000000.sdmpfalse
      unknown
      https://pcapp.store/pixelgif.phpmchrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        http://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjichrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          http://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkjdchrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            http://anglebug.com/6041edchrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://docs.google.com/document/Jchrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://doubleclick.net/t/kchrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhonechrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    http://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkkchrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://issuetracker.google.com/284462263chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx348//kchrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://www.google.com/dl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3kchrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklychrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_instaSetup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://dns-tunnel-check.googlezip.net/connectchrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://dl.google.com/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eeigpnchrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://docs.google.com/document/:chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://pcapp.stapi.phpchrome.exe, 00000003.00000002.3406164652.00006BB403280000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://anglebug.com/7714chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://td.doubleclick.net/chrome.exe, 00000003.00000002.3409514883.00006BB403678000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410355579.00006BB403798000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx348/chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480725597&cv=chrome.exe, 00000003.00000002.3397251590.00006BB402B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              https://pcapp.store/pixel.gif?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&version=fa.1091y&evt_src=fa_Setup.exe, 00000000.00000003.2132485262.00000000005F6000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2722385412.000000000387E000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.0000000000597000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2709834717.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904637840.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.00000000004F0000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2902835115.000000000059A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000003.2722385412.0000000003880000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.000000000054E000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3367862742.000002A10D89C000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9C7000.00000004.00000020.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9B0000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2977343215.0000013607CAC000.00000004.00000020.00020000.00000000.sdmp, AutoUpdater.exe, 0000002B.00000002.2977343215.0000013607C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.google.com/chrome/tips/chrome.exe, 00000003.00000002.3397251590.00006BB402B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncanchrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://drive.google.com/?lfhs=2chrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://anglebug.com/6248chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://anglebug.com/5281chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://pcapp.store/tos.html?guid=Setup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmp, nspF85F.tmp, 00000009.00000002.2904280349.000000000053B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://www.google.com/dl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompechrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://www.youtube.com/?feature=ytcachrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://pcapp.store/inst_cpg.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&_fcid=1728941759157143&veSetup.exe, 00000000.00000003.2129137714.000000000063E000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000003.2119038620.0000000002BCB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://issuetracker.google.com/255411748chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://csp.withgoogle.com/csp/analytics-container-tag-servingCross-Origin-Resource-Policy:chrome.exe, 00000003.00000002.3398357448.00006BB402C44000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://docs.google.com/document/u/0/create?usp=chrome_actionschrome.exe, 00000003.00000002.3395587487.00006BB4029C0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395692908.00006BB4029D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://pcapp.store/api/api.phpichrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://pcapp.store/pixelgif.phpchrome.exe, 00000003.00000002.3408963876.00006BB4035D0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408429003.00006BB403518000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410644893.00006BB4037EC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://anglebug.com/7246chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://anglebug.com/7369chrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392561003.00006BB4026BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400275582.00006BB402DDC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://anglebug.com/7489chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        http://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaeachrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://chrome.google.com/webstorechrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3393143104.00006BB402780000.00000004.00000001.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000002.3369268007.000002A10D9C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://pcapp.stchrome.exe, 00000003.00000002.3406164652.00006BB403280000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405758513.00006BB40323C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3389909033.00006BB40247C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3392967994.00006BB402750000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://anglebug.com/5881Dzchrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://td.doubleclick.net/td/update?ig_name=4s681066530.1730480726chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://pcapp.store/api/api.phpkchrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820456&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      http://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppechrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3chrome.exe, 00000003.00000002.3410970707.00006BB4039CC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icochrome.exe, 00000003.00000002.3400220409.00006BB402DCC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://pcapp.storechrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391701402.00006BB4025EC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3414494506.00006BB403DCC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjchrome.exe, 00000003.00000002.3388220208.00006BB4022F0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://issuetracker.google.com/161903006chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                http://anglebug.com/7279kchrome.exe, 00000003.00000002.3399139038.00006BB402D34000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  http://dl.google.com/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkkehgbnfchrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://pcapp.store1chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://pcapp.store/chrome.exe, 00000003.00000002.3401345891.00006BB402E88000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3378120947.000001FDB785D000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3387298139.00006BB40226C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397555319.00006BB402B90000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407426590.00006BB403368000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3394176825.00006BB40288A000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3388433130.00006BB402328000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3407744038.00006BB4033BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3398267013.00006BB402C2C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415288030.00006BB403E58000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405832387.00006BB403254000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3378120947.000001FDB7857000.00000004.00000001.00040000.00000000.sdmp, chrome.exe, 00000003.00000002.3412293775.00006BB403B44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3406304481.00006BB40329C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3388745796.00006BB40235C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3408429003.00006BB403518000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3415528235.00006BB403E8C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3399907740.00006BB402DA4000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3369780144.000000255B5FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionschrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacychrome.exe, 00000003.00000002.3395174898.00006BB402974000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397620498.00006BB402BA0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pchrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://doubleclick.net/Hchrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820411&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  http://anglebug.com/7553chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  http://dl.google.com/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckhobaglnchrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://pcapp.storeHXchrome.exe, 00000003.00000002.3389089124.00006BB402394000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820429&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        http://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pachrome.exe, 00000003.00000002.3402010618.00006BB402EE0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          http://anglebug.com/5371chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://m.google.com/devicemanagement/data/apichrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                            unknown
                                                                                                                            https://docs.google.com/presentation/u/0/create?usp=chrome_actionschrome.exe, 00000003.00000002.3394890844.00006BB402910000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                              unknown
                                                                                                                              https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820450&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                unknown
                                                                                                                                http://anglebug.com/7556chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=156786411258&cr_id=682239234212&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                  unknown
                                                                                                                                  https://chromewebstore.google.com/chrome.exe, 00000003.00000002.3386961426.00006BB40221C000.00000004.00000001.00020000.00000000.sdmp, PcAppStore.exe, 0000000B.00000003.3080624079.000002A10D895000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://pcapp.storeHchrome.exe, 00000003.00000002.3382164987.000001FDBA117000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                                                                                    unknown
                                                                                                                                    https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=fa.1091y:Setup.exe, 00000000.00000002.2376129578.0000000002BB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      unknown
                                                                                                                                      https://pcapp.store/LMEMHSetup.exe, 00000000.00000002.2375464054.00000000005C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        unknown
                                                                                                                                        https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_minSetup.exe, 00000000.00000002.2375464054.000000000055A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          unknown
                                                                                                                                          https://clients4.google.com/chrome-syncchrome.exe, 00000003.00000002.3389563150.00006BB4023C4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                            unknown
                                                                                                                                            https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928&cr_id=688766820414&cv_id=0&format=$chrome.exe, 00000003.00000002.3412573423.00006BB403C0C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                              unknown
                                                                                                                                              https://csp.withgoogle.com/csp/analytics-container-tag-servingkchrome.exe, 00000003.00000002.3404927444.00006BB403190000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                unknown
                                                                                                                                                https://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppchrome.exe, 00000003.00000002.3397968979.00006BB402BE8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                  unknown
                                                                                                                                                  http://anglebug.com/6692chrome.exe, 00000003.00000002.3392172496.00006BB402648000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                  • URL Reputation: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://dl.google.com/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/chrome.exe, 00000003.00000003.2943513759.00006BB402EA8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                    unknown
                                                                                                                                                    https://issuetracker.google.com/258207403chrome.exe, 00000003.00000002.3405343626.00006BB4031F4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    unknown
                                                                                                                                                    https://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgkchrome.exe, 00000003.00000002.3397457787.00006BB402B70000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                      unknown
                                                                                                                                                      http://anglebug.com/3623chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                      unknown
                                                                                                                                                      https://doubleclick.net/chrome.exe, 00000003.00000002.3411721750.00006BB403AC0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3412371516.00006BB403B68000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3400792034.00006BB402E44000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409353508.00006BB40363C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411113065.00006BB403A18000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3402467161.00006BB402F10000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3409278088.00006BB403634000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3411874127.00006BB403AFC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410107321.00006BB40375C000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3410500926.00006BB4037BC000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3405263345.00006BB4031DC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                        unknown
                                                                                                                                                        http://anglebug.com/3625chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928chrome.exe, 00000003.00000002.3400792034.00006BB402E5E000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3397057518.00006BB402B04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                          unknown
                                                                                                                                                          http://anglebug.com/3624chrome.exe, 00000003.00000002.3404657760.00006BB403150000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                          • URL Reputation: safe
                                                                                                                                                          unknown
                                                                                                                                                          https://docs.google.com/presentation/Jchrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                            unknown
                                                                                                                                                            http://anglebug.com/5007chrome.exe, 00000003.00000002.3393897412.00006BB402844000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                            • URL Reputation: safe
                                                                                                                                                            unknown
                                                                                                                                                            https://drive.google.com/drive/installwebapp?usp=chrome_defaultchrome.exe, 00000003.00000002.3394035956.00006BB402868000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000003.00000002.3391467376.00006BB402590000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                              unknown
                                                                                                                                                              http://anglebug.com/3862chrome.exe, 00000003.00000002.3393326791.00006BB4027B8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                              • URL Reputation: safe
                                                                                                                                                              unknown
                                                                                                                                                              https://pcapp.storeAccess-Control-Allow-Credentials:chrome.exe, 00000003.00000002.3391701402.00006BB4025EC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                unknown
                                                                                                                                                                • No. of IPs < 25%
                                                                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                                                                • 75% < No. of IPs
                                                                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                64.176.203.93
                                                                                                                                                                unknownUnited States
                                                                                                                                                                11022ALABANZA-BALTUSfalse
                                                                                                                                                                142.250.186.67
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.78
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.228
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                207.246.91.177
                                                                                                                                                                unknownUnited States
                                                                                                                                                                20473AS-CHOOPAUSfalse
                                                                                                                                                                216.58.212.142
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.186.174
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                64.233.184.154
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.226
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.227
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                147.182.211.77
                                                                                                                                                                unknownUnited States
                                                                                                                                                                27555BV-PUBLIC-ASNUSfalse
                                                                                                                                                                216.58.212.130
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.184.200
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.186.138
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                1.1.1.1
                                                                                                                                                                unknownAustralia
                                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                                142.250.185.232
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                212.102.56.179
                                                                                                                                                                unknownItaly
                                                                                                                                                                60068CDN77GBfalse
                                                                                                                                                                64.233.167.84
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                239.255.255.250
                                                                                                                                                                unknownReserved
                                                                                                                                                                unknownunknownfalse
                                                                                                                                                                142.250.185.196
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.131
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                18.173.205.117
                                                                                                                                                                unknownUnited States
                                                                                                                                                                3MIT-GATEWAYSUSfalse
                                                                                                                                                                207.211.211.27
                                                                                                                                                                unknownUnited States
                                                                                                                                                                14135NAVISITE-EAST-2USfalse
                                                                                                                                                                142.250.186.100
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.184.238
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.185.72
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                169.150.255.181
                                                                                                                                                                unknownUnited States
                                                                                                                                                                2711SPIRITTEL-ASUSfalse
                                                                                                                                                                172.217.16.130
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                IP
                                                                                                                                                                192.168.2.6
                                                                                                                                                                192.168.2.23
                                                                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                Analysis ID:1546932
                                                                                                                                                                Start date and time:2024-11-01 18:04:24 +01:00
                                                                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                                                                Overall analysis duration:0h 11m 8s
                                                                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                                                                Report type:full
                                                                                                                                                                Cookbook file name:default.jbs
                                                                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                Number of analysed new started processes analysed:17
                                                                                                                                                                Number of new started drivers analysed:0
                                                                                                                                                                Number of existing processes analysed:0
                                                                                                                                                                Number of existing drivers analysed:0
                                                                                                                                                                Number of injected processes analysed:27
                                                                                                                                                                Technologies:
                                                                                                                                                                • HCA enabled
                                                                                                                                                                • EGA enabled
                                                                                                                                                                • AMSI enabled
                                                                                                                                                                Analysis Mode:default
                                                                                                                                                                Analysis stop reason:Timeout
                                                                                                                                                                Sample name:Setup.exe
                                                                                                                                                                Detection:MAL
                                                                                                                                                                Classification:mal57.spyw.evad.winEXE@36/293@0/30
                                                                                                                                                                EGA Information:
                                                                                                                                                                • Successful, ratio: 100%
                                                                                                                                                                HCA Information:
                                                                                                                                                                • Successful, ratio: 78%
                                                                                                                                                                • Number of executed functions: 206
                                                                                                                                                                • Number of non-executed functions: 142
                                                                                                                                                                Cookbook Comments:
                                                                                                                                                                • Found application associated with file extension: .exe
                                                                                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                                                • Report size getting too big, too many NtOpenKey calls found.
                                                                                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                • Skipping network analysis since amount of network traffic is too extensive
                                                                                                                                                                • VT rate limit hit for: Setup.exe
                                                                                                                                                                TimeTypeDescription
                                                                                                                                                                13:06:17API Interceptor583x Sleep call for process: Watchdog.exe modified
                                                                                                                                                                13:06:18API Interceptor195x Sleep call for process: explorer.exe modified
                                                                                                                                                                13:06:50API Interceptor1x Sleep call for process: PcAppStore.exe modified
                                                                                                                                                                18:06:18AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PCAppStore "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                18:06:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdater "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
                                                                                                                                                                18:06:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Watchdog "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091y
                                                                                                                                                                18:06:44AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PCAppStore "C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                18:06:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PcAppStoreUpdater "C:\Users\user\PCAppStore\AutoUpdater.exe" /i
                                                                                                                                                                18:07:01AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Watchdog "C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091y
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                212.102.56.179SecuriteInfo.com.TrojanPSW.Purelog.21832.24487.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                                                                                • static.adtidy.net/windows/installer.exe
                                                                                                                                                                SecuriteInfo.com.TrojanPSW.Purelog.21832.24487.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                                                                                • static.adguard.com/installer.v1.0.json
                                                                                                                                                                1.1.1.1PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                                • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
                                                                                                                                                                AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                • 1.1.1.1/
                                                                                                                                                                INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
                                                                                                                                                                Go.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                • 1.1.1.1/
                                                                                                                                                                207.246.91.177Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                    Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                        147.182.211.77Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            No context
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            CLOUDFLARENETUShttps://issuu.com/mathildagr/docs/pmd9746827?fr=sZTMyNjc4NzAyNzMGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 104.17.24.14
                                                                                                                                                                            file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                                                                                            • 104.26.1.231
                                                                                                                                                                            file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                                                                                            • 104.26.1.231
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 188.114.96.3
                                                                                                                                                                            https://myabd.co.uk/main/arull.php?7080797967704b53693230746450544d6f737a6b6a4e533076544b7972566438774a38394d4841413d3d#EMAILBASE64#Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                            • 104.17.25.14
                                                                                                                                                                            https://otcuser3.valr.live/signInGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 104.17.24.14
                                                                                                                                                                            https://u47872954.ct.sendgrid.net/ls/click?upn=u001.fn1BsYIkFXRWxBLF12AvXhKUqktmOI7EPkchHYpa8lb2yJr9vm47Biq1iwhYH4x0W6E6_1tlZTUgFpToOJRvXeJjZ1lQQtiPaV281MW3UjMlmRxOXQrHf3E28Ct8cWw3pFJv8ww35QVlHVAsV9LrE8WJ-2FqWVvVFyUxLS7XbjE4ioBaNzI7Y9AQvglzmjEqljOvLuB-2FqyLAOnwfIZ8a2UOhb0kq4DsltFbCSVl8L5tTVcXPovhejZuw7J5gFYEuhvfLU6jp9IiI6bOp4vutoVple794Svog7VmNTHCQykEIajsBwvsIA9xBhrTaUhPe3riTZOj5RQVgP8LolzHF5ds6ImaI4Q1KNsmEF06CineSoPu7BKGd-2B4IINKzojAY3yUTkdWQLuCwDcmh7vK-2Fm4MQ0xAiPJ-2BNim16FZPVrX44e4DFM1rc1r1ZYN2APdeEIThalu0Ag-2BNzl5TCF9-2F-2B4cIgV-2B8ceF573hvcKOOmdD1jbxRbFryn-2FGT77SPyR6cNo7joqYajHU5-2F1gyPof24NnmOIwvhn7qKr0Ihz3SIWFLubPXV0GdcG6guT-2FBjwN6h83YPSF-2F5Pk0uzrf9DG4ZRnISsjJaazqmdBRAAsyoWwP5iXWDQEfiJXubX9fD-2BREtQifDIoI36c8qvCy5hrOP9aAfzd2djtg-2B8gR7MvgWYCa5sA7wAgdCKrrNRjX7eeAtG5StCtmRi-2BsSO4PCFgsA4QlR8AVRyhdPdKhSYzgA-2F1BCyYmRsFeWn4YzRn0mexGeZM3PwhHAdqlfom16LJGSiVeG98p5ZK5N-2BZQuMTlINorxwlmSmaGarY5x7TUyztB-2Bv8L8gRhXdcDKSzxiMknwYCjp3XaQdwr-2Fp8kePQSl33tJvX1ITAiP7FBhlwoPgNxbRoTwVzl0I2Q2bE71pQB2jeSQldBukVcgJT-2BrmpKQA1GW5-2B59frk-3DGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 172.66.40.133
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 188.114.96.3
                                                                                                                                                                            file.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                                                                            • 172.64.41.3
                                                                                                                                                                            https://u7990385.ct.sendgrid.net/ls/click?upn=u001.oZ6GXC16Ztdw1ob-2F3C5yow-2FsK2YC4S8s269h9OLgp-2FGcQesCtXDXKgCEAF90Sa3OUL2ncGoAKstQjRhddelr-2Bx3frrehyL8aaBbhAx-2Fm3uQTToUZwzw9vU-2BHl4N8-2FbXNOWh47xHSpNswH5B20hFc1rkwm1HkocouB6puE-2FnM91Ea9xIyldie1eyHQvDQGF6-2F1OUGSCOg8K-2Fk8REDXGncryLNWAkNll9tI4svh29XngoJuJcvPHIwWw07juA1Lr687mlf_LZJN6rqeZVHTY7vi7TysfnSOWUsKUPL2t2FWuf1mHJZyRrnfnXk5in-2FtsLaVkEL4z-2F5H1v5rdZCMtKV4-2B7XswPaXSOX44YEil-2BgQ6f1-2BLxpcwnoVslshbeFD8-2FSkDYUL5gsTS7cnhi8iHs4T9b6wzPIbVlUAEwQAwoGeUFJH5x3RAGtspzpDyRWDwHNrMMOluLHeocJQAj7iS1dnS-2B-2Fhpf21Fjpr9lUosnkGJYIkfG0KNsjglBmf2yQvwZsg0Wp706kciqJgB5pqtemV1qFgZLIL2K-2BsyRLGqv3bbeqv6LWX-2Fbn97e4q8h4LdJzfXKTxRJD2tMgj2k7Ls1BdPjLturPdeJvpG2db-2FhwENpXetZR7k21gPz6in5zk7zhcmgIkZssf1WUkdDcjfwIeY2HuQe6EHwacpAnjlFSG7cGBDYbRKnbjWz72QvhesvDQrxGZA-2F-2FwuD5CryGFeRAazVMLU-2FTUgYuXTJzCzL6qav9lYxCC-2Bwx97sSjci4FffUtDhPcIZfKCP-2Ff9rufbc-2FOdTD6VLIHU5lNW4k8Nb-2FWedSu8kS9RXhRxjWAbV4qYK-2F68HLgFHbzOrm6M-2FG6a-2BnVs9TkK9ei8xVDo6cAhkQYCxDYOCBJJC-2BfLWulZgQ85hdg59312Kv6zX2g11nE5GRn-2B6U-2B2tuv67vEmY8CUatMt7UrQHEhVlrPnXi1EamUHW4AGpMQfKBj0GXRdJxG0fD3Zx-2FiIXcDEoi3GhoWLQTKZU-2FWlBKJiyqDLjDXS6qRg1X-2Fsd3R5k7fswdpYLTizSHt12T6-2Bo0IoKg0cyJsPKBfoK9Uleu7f9wgtdH4RtvaMbk9-2Buqhl6zW9NHZET-2BbGJHqyqlBeTSBtTZM6ltHEDZrojb0Lhszq-2BKoSCsuyjzgKAFmmWSRMGxwsXoHHuV8LoFEZjuiOSkTWEP-2FvQ0ZaWfqnp81VXTEktfVY9Xmx-2FaHq5NRH3vqpZc6LNkkSHnpJBPIYA83Mw-3D-3DGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 162.159.61.3
                                                                                                                                                                            ALABANZA-BALTUS0T32Kz4dZU.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                                                                            • 65.108.249.83
                                                                                                                                                                            NlpWS1Iq5Z.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                                                                            • 65.108.249.83
                                                                                                                                                                            http://ddl.safone.devGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 65.108.207.55
                                                                                                                                                                            yt5xqAvHnZ.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                            • 65.109.243.0
                                                                                                                                                                            la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 65.109.195.245
                                                                                                                                                                            byte.mips.elfGet hashmaliciousOkiruBrowse
                                                                                                                                                                            • 65.108.253.200
                                                                                                                                                                            bin.i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                                                                                            • 208.56.197.29
                                                                                                                                                                            Unlock_Tool_2.3.1.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                            • 65.109.142.154
                                                                                                                                                                            aZm1EZ2IYr.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                            • 65.109.142.154
                                                                                                                                                                            Unlock_Tool_2.4.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                            • 65.109.142.154
                                                                                                                                                                            BV-PUBLIC-ASNUSSetup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.211.77
                                                                                                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.211.77
                                                                                                                                                                            la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.236.130
                                                                                                                                                                            armv4l.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.183.0.9
                                                                                                                                                                            1.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                                            • 147.182.192.25
                                                                                                                                                                            5.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                                            • 147.182.192.25
                                                                                                                                                                            https://sucursal-virtual03.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.129.240
                                                                                                                                                                            https://www.google.com/url?q=https://www.google.com/url?q%3DdCSMjVnvsqsqaP8pEWWm%26rct%3DSpPq9HncUaCXUtCZusX0%26sa%3Dt%26esrc%3DuZR6jk9A67Rj7RZhLuPE%26source%3D%26cd%3Deh0xIKCKpKh7i4kTt26p%26cad%3DVEVtMkQKVNr1KW4fxShi%26ved%3DNTDACygNXetEDbRT8YiY%26uact%3D%2520%26url%3Damp%252F%E2%80%8Breid%C2%ADopur%C2%ADificador%E2%80%8B.%E2%80%8Bc%C2%ADom.b%C2%ADr//////xone1/yzrog/c3R1YXJ0Lm1hcnN0b25Ac2VhYm9hcmRtYXJpbmUuY29t$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                            • 147.182.205.62
                                                                                                                                                                            147.182.187.19-mips-2024-09-04T14_22_15.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.187.19
                                                                                                                                                                            http://tsretires.co/CZNFFSNGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 147.182.154.199
                                                                                                                                                                            AS-CHOOPAUShttps://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 45.32.1.23
                                                                                                                                                                            createbestthingswithmegoodthingswithgoodthings.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                                                                                                                                            • 66.42.65.6
                                                                                                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 45.32.1.23
                                                                                                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 207.246.91.177
                                                                                                                                                                            wZU2edEGL3.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 204.80.129.14
                                                                                                                                                                            belks.spc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                            • 95.179.203.61
                                                                                                                                                                            jew.arm.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 66.42.126.74
                                                                                                                                                                            nklx86.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 66.42.54.66
                                                                                                                                                                            splarm7.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 45.76.22.31
                                                                                                                                                                            nabmpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                            • 45.32.162.126
                                                                                                                                                                            No context
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\Math.dllhttps://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                                                                                                                                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    tKr6T60C1r.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                          Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            MDE_File_Sample_c30dd28cb119f2aa20ddabe8968b8cadbe80bcb2.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                Process:C:\Windows\explorer.exe
                                                                                                                                                                                                File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-20, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 17718035701737936663074570240.000000
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):106064
                                                                                                                                                                                                Entropy (8bit):4.012501861373781
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:768:d1DGkxGPgHO6jk0rnaPytHJNOLNlHj8SryPIRCR1vIgPa9jm3BypTh3kXhainGxX:GkWgIPytHQOhainGxnQ0BFN2KU58l
                                                                                                                                                                                                MD5:DDE770B6F0B7B4943A307C3EB4A31738
                                                                                                                                                                                                SHA1:F85518F4222FF7C8BBB4C6EAD8371F38C769FB61
                                                                                                                                                                                                SHA-256:977833AEBB8C881069136464C00B986085D781B7A399852F0728A1C574F1408E
                                                                                                                                                                                                SHA-512:9420ACBC9C242FD3B50E34749A3749C44E591DEE50AC2CDBA25CDB2ED354C5B710DE660AFECF00720A56F34258B3ADCDBDEB144255BAB611B7E1E2171163812E
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:....h... ...P...........P...............Y...p...^...........H..........W.......e.n.-.C.H.;.e.n.-.G.B.............................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B.........................................
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\AutoUpdater.exe
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):8
                                                                                                                                                                                                Entropy (8bit):3.0
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:pEn:2
                                                                                                                                                                                                MD5:34263D558D9E5A7EDC04F8D80C76649D
                                                                                                                                                                                                SHA1:9CF0B311765445B7BB1C9B25767E615019305BFA
                                                                                                                                                                                                SHA-256:DDA3B20D07CF936A8EBF80B771BF76A130AEDE7ABE77261D1FD254D4A3AE3450
                                                                                                                                                                                                SHA-512:BD8A989E06F7A23105419AA7785A465484657E1C2BB6403CA0402B5A5251172F7074A86AE57CB4800A90FBC1EC69E31D1DBCE9103535CDFC3A61EB2AC2103F78
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:fa.1059o
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):318526624
                                                                                                                                                                                                Entropy (8bit):6.931313942573336
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3145728:tEJqgvUBRlhK9QJiDS610scieJq1SXCSnsmdAGM9bN:tEaKe0Djq7hCSkb
                                                                                                                                                                                                MD5:5E53C834E0E67E7D4C79BE6DD5108B71
                                                                                                                                                                                                SHA1:60FB154152F64488E9FE8E97A5A8BF71552F49F7
                                                                                                                                                                                                SHA-256:4DAAB8505C68A089818C8F221EA2B27BD97651E078CA9C5B62AC1122347B4EAE
                                                                                                                                                                                                SHA-512:8E36499649B2237C32AC74797C76B84323449E0AEF906E93429C02BCCCA4B5DC6AF94FD9BA5A8AAC18904DD1992EA09194EF1E75750BB86035C20FE080B70397
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.7......,.......,.......D...=...........^6......\7..............................................................m...........................................................................................................................................................................3................2..................................................................................................................................j.......................k...................................................................................................................s..........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):69120
                                                                                                                                                                                                Entropy (8bit):6.024967061017882
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:1536:GUZ9QC7V7IGMp2ZmtSX5p9IeJXlSM2tS:T97WSth5lwt
                                                                                                                                                                                                MD5:85428CF1F140E5023F4C9D179B704702
                                                                                                                                                                                                SHA1:1B51213DDBAEDFFFB7E7F098F172F1D4E5C9EFBA
                                                                                                                                                                                                SHA-256:8D9A23DD2004B68C0D2E64E6C6AD330D0C648BFFE2B9F619A1E9760EF978207A
                                                                                                                                                                                                SHA-512:DFE7F9F3030485CAF30EC631424120030C3985DF778993342A371BF1724FA84AA885B4E466C6F6B356D99CC24E564B9C702C7BCDD33052172E0794C2FDECCE59
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                • Filename: , Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: tKr6T60C1r.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup (1).exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup (1).exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: MDE_File_Sample_c30dd28cb119f2aa20ddabe8968b8cadbe80bcb2.zip, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w.................F.........................5.....5....:6....Rich...........PE..L.....Oa...........!................KG....................................................@.............................B.......(....................................................................................................................text...b........................... ..`.rdata..R...........................@..@.data............2..................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):140288
                                                                                                                                                                                                Entropy (8bit):6.334087823000165
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:H5dnvmOEATceozVDkRasOCdUFZrR7beB2SK0XCC+W/ST+BeXZQUC5:ZdnvmsTceZUtCdUFZr9b4KznC5
                                                                                                                                                                                                MD5:9C7A4D75F08D40AD6F5250DF6739C1B8
                                                                                                                                                                                                SHA1:793749511C61B00A793D0AEA487E366256DD1B95
                                                                                                                                                                                                SHA-256:6EB17C527C9E7F7FEA1FDB2EA152E957B50A56796E53CE1E5946B165B82DEAEF
                                                                                                                                                                                                SHA-512:E85235307B85FFD3AAB76FF6290BEE0B3B9FD74C61A812B5355FE7B854D4C6B77BD521E52638D28E249A43D9EC7AA6F2670AF2B1C671091492C7FE19D6F9A4E6
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......../.iTN.:TN.:TN.:.6.;^N.:.6.;.N.:.6.;@N.:.6.;UN.:...;AN.:...;DN.:...;{N.:.6.;_N.:TN.:'N.:B..;QN.:B..;UN.:B.%:UN.:TNM:UN.:B..;UN.:RichTN.:........................PE..L...z..f...........!...(.x...................................................`..............................................x...x....0..X....................@......0...............................p...@............................................text...0v.......x.................. ..`.rdata..\~...........|..............@..@.data...............................@....rsrc...X....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):12288
                                                                                                                                                                                                Entropy (8bit):5.814115788739565
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                                                                                                                                                                MD5:CFF85C549D536F651D4FB8387F1976F2
                                                                                                                                                                                                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                                                                                                                                                                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                                                                                                                                                                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:GIF image data, version 89a, 16 x 16
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):997
                                                                                                                                                                                                Entropy (8bit):4.188896534234179
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12:2E5KZbHOjOruFw6MLxENScRVar7FC53tK1Oqd3Aa0n:tAlHOjOX60ENvRVZKbEn
                                                                                                                                                                                                MD5:1636218C14C357455B5C872982E2A047
                                                                                                                                                                                                SHA1:21FBD1308AF7AD25352667583A8DC340B0847DBC
                                                                                                                                                                                                SHA-256:9B8B6285BF65F086E08701EEE04E57F2586E973A49C5A38660C9C6502A807045
                                                                                                                                                                                                SHA-512:837FA6BCBE69A3728F5CB4C25C35C1D13E84B11232FC5279A91F21341892AD0E36003D86962C8AB1A056D3BEEB2652C754D51D6EC7EEE0E0EBFE19CD93FB5CB0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a............P..........4q...5j...O..F.].......................o..._.....5y.t........\....K>}...g..t....X...B..ET....t~....go..Jx...........|..U!f.|....>u.M.........w>..+r...|...A{.....t...E...b.8}....d....A.....R..y..l...w....G5u...{....t.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,...............H..A....`pp....~.xR......d.......,...D...)2 .1.....N` R......(@......,8RDA../..XB....P.F .....#...b`F...#8p......<\.`.........A....n|.CH...........+... .E.....d`.@......;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):39424
                                                                                                                                                                                                Entropy (8bit):4.684597989866362
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
                                                                                                                                                                                                MD5:A35CDC9CF1D17216C0AB8C5282488EAD
                                                                                                                                                                                                SHA1:ED8E8091A924343AD8791D85E2733C14839F0D36
                                                                                                                                                                                                SHA-256:A793929232AFB78B1C5B2F45D82094098BCF01523159FAD1032147D8D5F9C4DF
                                                                                                                                                                                                SHA-512:0F15B00D0BF2AABD194302E599D69962147B4B3EF99E5A5F8D5797A7A56FD75DD9DB0A667CFBA9C758E6F0DAB9CED126A9B43948935FE37FC31D96278A842BDF
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[.H.[.H.[.H.O.I.R.H.[.I...H...M.Y.H...L.Z.H...H.Z.H.....Z.H...J.Z.H.Rich[.H.................PE..L...n..c...........!.....T.........._........p............................... ............@..........................x......D...d...............................t....w..8...............................................D............................text....S.......T.................. ..`.rdata.......p.......X..............@..@.data....i...........d..............@....idata..A............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):24064
                                                                                                                                                                                                Entropy (8bit):5.819708895488079
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:384:n7U5CiIZ1ZC2RvhrTfldNuwQ5pk+BISivMyyOgqCoRUj+OvHxOuofnykhVQJrTU:YoZ1ZnhrTfldqk7Yyy94RxOcVQJrT
                                                                                                                                                                                                MD5:F4D89D9A2A3E2F164AEA3E93864905C9
                                                                                                                                                                                                SHA1:4D4E05EE5E4E77A0631A3DD064C171BA2E227D4A
                                                                                                                                                                                                SHA-256:64B3EFDF3DE54E338D4DB96B549A7BDB7237BB88A82A0A63AEF570327A78A6FB
                                                                                                                                                                                                SHA-512:DBDA3FE7CA22C23D2D0F2A5D9D415A96112E2965081582C7A42C139A55C5D861A27F0BD919504DE4F82C59CF7D1B97F95ED5A55E87D574635AFDB7EB2D8CADF2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.'..fI_.fI_.fI_3.H^.fI_.fH_?fI_.8M^.fI_.8I^.fI_.8._.fI_.8K^.fI_Rich.fI_........PE..L...`..Z...........!.....>..........E........P............................................@..........................X......@Z..P....p..........................H....X...............................................P...............................text...W<.......>.................. ..`.rdata.......P.......B..............@..@.data...@....`.......R..............@....rsrc........p.......T..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):140288
                                                                                                                                                                                                Entropy (8bit):6.334087823000165
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:H5dnvmOEATceozVDkRasOCdUFZrR7beB2SK0XCC+W/ST+BeXZQUC5:ZdnvmsTceZUtCdUFZr9b4KznC5
                                                                                                                                                                                                MD5:9C7A4D75F08D40AD6F5250DF6739C1B8
                                                                                                                                                                                                SHA1:793749511C61B00A793D0AEA487E366256DD1B95
                                                                                                                                                                                                SHA-256:6EB17C527C9E7F7FEA1FDB2EA152E957B50A56796E53CE1E5946B165B82DEAEF
                                                                                                                                                                                                SHA-512:E85235307B85FFD3AAB76FF6290BEE0B3B9FD74C61A812B5355FE7B854D4C6B77BD521E52638D28E249A43D9EC7AA6F2670AF2B1C671091492C7FE19D6F9A4E6
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......../.iTN.:TN.:TN.:.6.;^N.:.6.;.N.:.6.;@N.:.6.;UN.:...;AN.:...;DN.:...;{N.:.6.;_N.:TN.:'N.:B..;QN.:B..;UN.:B.%:UN.:TNM:UN.:B..;UN.:RichTN.:........................PE..L...z..f...........!...(.x...................................................`..............................................x...x....0..X....................@......0...............................p...@............................................text...0v.......x.................. ..`.rdata..\~...........|..............@..@.data...............................@....rsrc...X....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):12288
                                                                                                                                                                                                Entropy (8bit):5.814115788739565
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                                                                                                                                                                MD5:CFF85C549D536F651D4FB8387F1976F2
                                                                                                                                                                                                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                                                                                                                                                                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                                                                                                                                                                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:GIF image data, version 89a, 16 x 16
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):997
                                                                                                                                                                                                Entropy (8bit):4.188896534234179
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12:2E5KZbHOjOruFw6MLxENScRVar7FC53tK1Oqd3Aa0n:tAlHOjOX60ENvRVZKbEn
                                                                                                                                                                                                MD5:1636218C14C357455B5C872982E2A047
                                                                                                                                                                                                SHA1:21FBD1308AF7AD25352667583A8DC340B0847DBC
                                                                                                                                                                                                SHA-256:9B8B6285BF65F086E08701EEE04E57F2586E973A49C5A38660C9C6502A807045
                                                                                                                                                                                                SHA-512:837FA6BCBE69A3728F5CB4C25C35C1D13E84B11232FC5279A91F21341892AD0E36003D86962C8AB1A056D3BEEB2652C754D51D6EC7EEE0E0EBFE19CD93FB5CB0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a............P..........4q...5j...O..F.].......................o..._.....5y.t........\....K>}...g..t....X...B..ET....t~....go..Jx...........|..U!f.|....>u.M.........w>..+r...|...A{.....t...E...b.8}....d....A.....R..y..l...w....G5u...{....t.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,...............H..A....`pp....~.xR......d.......,...D...)2 .1.....N` R......(@......,8RDA../..XB....P.F .....#...b`F...#8p......<\.`.........A....n|.CH...........+... .E.....d`.@......;
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):39424
                                                                                                                                                                                                Entropy (8bit):4.684597989866362
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
                                                                                                                                                                                                MD5:A35CDC9CF1D17216C0AB8C5282488EAD
                                                                                                                                                                                                SHA1:ED8E8091A924343AD8791D85E2733C14839F0D36
                                                                                                                                                                                                SHA-256:A793929232AFB78B1C5B2F45D82094098BCF01523159FAD1032147D8D5F9C4DF
                                                                                                                                                                                                SHA-512:0F15B00D0BF2AABD194302E599D69962147B4B3EF99E5A5F8D5797A7A56FD75DD9DB0A667CFBA9C758E6F0DAB9CED126A9B43948935FE37FC31D96278A842BDF
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[.H.[.H.[.H.O.I.R.H.[.I...H...M.Y.H...L.Z.H...H.Z.H.....Z.H...J.Z.H.Rich[.H.................PE..L...n..c...........!.....T.........._........p............................... ............@..........................x......D...d...............................t....w..8...............................................D............................text....S.......T.................. ..`.rdata.......p.......X..............@..@.data....i...........d..............@....idata..A............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):26494
                                                                                                                                                                                                Entropy (8bit):1.9568109962493656
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                                                                                                                                                                                MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                                                                                                                                                                                SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                                                                                                                                                                                SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                                                                                                                                                                                SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):9728
                                                                                                                                                                                                Entropy (8bit):5.158136237602734
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:96:o0svUu3Uy+sytcS8176b+XR8pCHFcMcxSgB5PKtAtgt+Nt+rnt3DVEB3YcNqkzfS:o0svWyNO81b8pCHFcM0PuAgkOyuIFc
                                                                                                                                                                                                MD5:6C3F8C94D0727894D706940A8A980543
                                                                                                                                                                                                SHA1:0D1BCAD901BE377F38D579AAFC0C41C0EF8DCEFD
                                                                                                                                                                                                SHA-256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
                                                                                                                                                                                                SHA-512:2094F0E4BB7C806A5FF27F83A1D572A5512D979EEFDA3345BAFF27D2C89E828F68466D08C3CA250DA11B01FC0407A21743037C25E94FBE688566DD7DEAEBD355
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....Oa...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):24064
                                                                                                                                                                                                Entropy (8bit):5.819708895488079
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:384:n7U5CiIZ1ZC2RvhrTfldNuwQ5pk+BISivMyyOgqCoRUj+OvHxOuofnykhVQJrTU:YoZ1ZnhrTfldqk7Yyy94RxOcVQJrT
                                                                                                                                                                                                MD5:F4D89D9A2A3E2F164AEA3E93864905C9
                                                                                                                                                                                                SHA1:4D4E05EE5E4E77A0631A3DD064C171BA2E227D4A
                                                                                                                                                                                                SHA-256:64B3EFDF3DE54E338D4DB96B549A7BDB7237BB88A82A0A63AEF570327A78A6FB
                                                                                                                                                                                                SHA-512:DBDA3FE7CA22C23D2D0F2A5D9D415A96112E2965081582C7A42C139A55C5D861A27F0BD919504DE4F82C59CF7D1B97F95ED5A55E87D574635AFDB7EB2D8CADF2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.'..fI_.fI_.fI_3.H^.fI_.fH_?fI_.8M^.fI_.8I^.fI_.8._.fI_.8K^.fI_Rich.fI_........PE..L...`..Z...........!.....>..........E........P............................................@..........................X......@Z..P....p..........................H....X...............................................P...............................text...W<.......>.................. ..`.rdata.......P.......B..............@..@.data...@....`.......R..............@....rsrc........p.......T..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):93438040
                                                                                                                                                                                                Entropy (8bit):7.99999364947838
                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                SSDEEP:1572864:k0hJC9ncDgADGY+RlzbLQ5Z6Z3T44M2NwAVz0l/TnZkAWtvdiuPRJIWY988vE+B/:kl9csADbV+4cNw2E7ZkFLZP3IZNEO26v
                                                                                                                                                                                                MD5:C50F23A6E99F3FAEC7A10CEB1884F73E
                                                                                                                                                                                                SHA1:3FCBC3FFD376965F4C3825C0B77CE408FF54059C
                                                                                                                                                                                                SHA-256:CD7D28E668FE174A713C25B9EA15CA4AD25E9F757CA0CDA62BB43451066BBA2E
                                                                                                                                                                                                SHA-512:AE15BBFFDC97BD84B6DC62D154AD260CE5BCDA8107F15C6FA4E167293A491884820CC6DE3325D8677EC0D2C65697F351C74749F39910F8AC733B2C0163786C24
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................... ...........@.............................................HO..............X)...........................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...HO.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:GIF image data, version 89a, 1 x 1
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):42
                                                                                                                                                                                                Entropy (8bit):2.9881439641616536
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:CUXPQE/xlEy:1QEoy
                                                                                                                                                                                                MD5:D89746888DA2D9510B64A9F031EAECD5
                                                                                                                                                                                                SHA1:D5FCEB6532643D0D84FFE09C40C481ECDF59E15A
                                                                                                                                                                                                SHA-256:EF1955AE757C8B966C83248350331BD3A30F658CED11F387F8EBF05AB3368629
                                                                                                                                                                                                SHA-512:D5DA26B5D496EDB0221DF1A4057A8B0285D15592A8F8DC7016A294DF37ED335F3FDE6A2252962E0DF38B62847F8B771463A0124EF3F84299F262ED9D9D3CEE4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:GIF89a.............!.......,...........D.;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Sep 17 11:06:00 2024, mtime=Fri Nov 1 16:06:17 2024, atime=Tue Sep 17 11:06:00 2024, length=3119448, window=hide
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1872
                                                                                                                                                                                                Entropy (8bit):3.482654580546374
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:81vbPglpBJtkAq/EVRU5qwtkkO6iO/7mgJoqygm:81TPOBJtz6siqOO6iwJxyg
                                                                                                                                                                                                MD5:F1A32CA7D8471169BD94192606C71E8D
                                                                                                                                                                                                SHA1:53828B04A708B8B047638BEADE18405AB33D3201
                                                                                                                                                                                                SHA-256:7CE9F9DDA39A1938F186E29370A5FA4BE2E0A1FD2A54597DD18A5D6339406787
                                                                                                                                                                                                SHA-512:634D64AA230760F2053C58938FC0913F91E9595D44C8D68EB58C21FB3BA0F60566445E4F6592DD7441E793ED4AB59C3591305CE305E0C8C87A010F683D4A310A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:L..................F.@.. ....D.......Eo].,...D......X./.....................0.:..DG..Yr?.D..U..k0.&...&.......$..S... ..H.,.....].,......t...CFSF..1.....aY...PCAPPS~1....t.Y^...H.g.3..(.....gVA.G..k...F......aY..aY............................pc.P.C.A.p.p.S.t.o.r.e...D.j.2.X./.1Y.` .PCAPPS~1.EXE..N......1Y.`aY......"........................P.c.A.p.p.S.t.o.r.e...e.x.e.......Z...............-.......Y............Yh......C:\Users\user\PCAppStore\PcAppStore.exe..+.....\.....\.....\.....\.....\.....\.P.C.A.p.p.S.t.o.r.e.\.P.c.A.p.p.S.t.o.r.e...e.x.e...C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.P.C.A.p.p.S.t.o.r.e.../.i.n.i.t. .d.e.f.a.u.l.t. .s.h.o.w.M.+.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.P.C.A.p.p.S.t.o.r.e.\.p.c.a.p.p.s.t.o.r.e...i.c.o.........%USERPROFILE%\PCAppStore\pcappstore.ico...............................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):586072
                                                                                                                                                                                                Entropy (8bit):6.341658208567493
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:btVAhPej3HHF0jGKoNdasaI0fqxM4EuR4:bIhPetKOdasv0SHEuq
                                                                                                                                                                                                MD5:4B8501CCF1EB44EA96A20547D4EBE7D3
                                                                                                                                                                                                SHA1:369F68CBC186AA54E8439A2D419F56D6AFE1F98B
                                                                                                                                                                                                SHA-256:AC5480702B8621AB05262DD34AF2EDF532CE64B583226AE0903F89F7520D9B51
                                                                                                                                                                                                SHA-512:E6A21602365EC6D5AF8A09703550CAA1209A231477DD7BF7A0EAB67FF8D0B9E06E624CE9CF84182EF52B51EFEEB47449AAA866634B9ECDAFBB5EE3A31D6B7178
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.....i...i...i.I.j...i.I.l...i.I.m...i..&j...i..&m...i..&l.X.i.I.h...i...h...i..!l...i..!....i.......i..!k...i.Rich..i.........PE..d...`p.f.........."....(.....V......X..........@..........................................`..............................................................G...P..DR......X)..........0...T.......................(.......@............................................text...h........................... ..`.rdata..hm.......n..................@..@.data....<....... ..................@....pdata..DR...P...T..................@..@.rsrc....G.......H...r..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3119448
                                                                                                                                                                                                Entropy (8bit):5.959134900089195
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:exJU7RyXmh1k65fWsMlZVwDZoJ3zxuDrQ8Z8OQ2JTbiNG8g9MEBjQCsSK6Q3sV3i:e4RyG1k65uADZQ1mQ3Yk+hYyRKx
                                                                                                                                                                                                MD5:102313158837DA34ECE7FBE599A0EEC5
                                                                                                                                                                                                SHA1:2ADCC876A15F67B0DFAA41F8A79022D474DC7644
                                                                                                                                                                                                SHA-256:03CF9BA286CCEF3B827ACD4715BF0C9EF720833A50A9539D093098849A8F8179
                                                                                                                                                                                                SHA-512:965D8FD3239AB3E8D574EB2063C8D9037BFA6C996550CDF05046338F19DCEB23EDF2FAFFFCF377FBFDA39477D848BAA92A856CF821D542504BF7E206592A7B0A
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|^..|^..|^.._..|^.y_v.|^THx_..|^...^..|^TH._..|^THy_..|^.x_..|^.z_..|^.}_..|^..}^[.|^.Ox_..|^.Oy_..|^.O.^..|^...^..|^.O~_..|^Rich..|^........PE..d...|p.f.........."....(..&.........L0"........@.............................P0.....5.0...`...................................................*......./.P^....-.l....p/.X)... 0.0&...").p....................$).(...p!).@.............&.@............................text...~.&.......&................. ..`.rdata...a....&..b....&.............@..@.data....... +.......+.............@....pdata..l.....-.......,.............@..@.rsrc...P^..../..`..................@..@.reloc..0&... 0..(...H/.............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):146
                                                                                                                                                                                                Entropy (8bit):4.577360416859904
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:TKPyFfliFRNAl2sIaRjyM1KOTxLELMZ4MKLJF8EelYq8AsXJVVWM4v:TyyFflmSssI+j1NLELM6MKn8EquZVVCv
                                                                                                                                                                                                MD5:2845450EA9D938CFEA9809CA0C827F12
                                                                                                                                                                                                SHA1:8DE2189530DA5923365436C37E4C55C500AC3FBF
                                                                                                                                                                                                SHA-256:7FDADB3CA5B81C6D1C58A20610921BF89D63DC65B77BE982F422C6FD2A13F166
                                                                                                                                                                                                SHA-512:7D19FE6E9DD51BB880FD6FBB7EE126C8078771EE5166D53F312B04D117CE2897CBB6DFB5E5627314C3CF8B56F7A2BBF5B9D38258E7912B0AC5D420B611B7C363
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:Fhis folder contains the PC App Store for Microsoft Windows.....For additional information, please visit https://pcapp.store/?p=lpd_appstore-faq..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2187
                                                                                                                                                                                                Entropy (8bit):5.174613570611778
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:48:YZ1HdiyDF9hEM3ZMqr8ZPfOqfYLkGYOOzfhrE+ynWKrFH36AkM9zm88KCXvAZZoZ:oNdRvpMtZPPALkOOzVpynWKpH39kQm82
                                                                                                                                                                                                MD5:085BEB3B8ED4CF0DA500D6FCA74C0196
                                                                                                                                                                                                SHA1:8EE7FBBDD067E742FC7EC2F9F917E7A4B206CC5F
                                                                                                                                                                                                SHA-256:B1826AD6C1FA9748FF063FB70C3D89EB63AF4AD7A08942EEC3EF277D5C9C4E05
                                                                                                                                                                                                SHA-512:2DF5779812A1786C9097DE9DB3F2DFCD9773B311E3858D598B55EAADED7BD80981B11DCCAAA739D4F1F98AEECFEF0652AD61E80A82B52E4F83BBEFE53DC99627
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"106","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"9YPB4B","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"DLKAZHYK+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Ado
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):73
                                                                                                                                                                                                Entropy (8bit):4.089026662492467
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:YGVE8fptxgDQLRv6zjQJNRvUXZ5:YGFRt9IoNaZ5
                                                                                                                                                                                                MD5:3024A54E0C352ABE5EB5F753CA4828DA
                                                                                                                                                                                                SHA1:DF0206851654405C8E5C2D3BC96FB536B8C2DCBF
                                                                                                                                                                                                SHA-256:3CD0A703506C7394D6115D9FF721516560894358AEF07459F30D8930DF6C3B61
                                                                                                                                                                                                SHA-512:D9D44051DF56B29AA596EE38463B781DBE27F917F7DAE1B2420122616DA108520429DDA58C75C7E6B2D41093F83C5A4BAE96024885AF3956F23A3CE5BD3F9358
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"cpg":"default","inst_excl":null,"inst_addon":null,"inst_advanced":null}
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):93872
                                                                                                                                                                                                Entropy (8bit):6.891644876246852
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:1536:omsAYBdTU9fEAIS2PEtu32OFRLTGWJjRAmASZErPz3p0073A4xw:XfY/TU9fE9PEtuGCR3JJCm/qzK0UP
                                                                                                                                                                                                MD5:05827553A73EDFEB710754DF42DAA0E9
                                                                                                                                                                                                SHA1:91264933EA3D0A3B0E18095D5A0CF144A040CBDD
                                                                                                                                                                                                SHA-256:930C5F050D80C2FF300AD2BAB47AB69143044836A8E73E61487C11CDFC50A489
                                                                                                                                                                                                SHA-512:F127097FC936F9FF59E28ADD8A42DC5449B0360995B44595B093F6D4E3C4C0A0F5B6293B929C35A69C766F2E47ECEB75E1245DAB33C514B11EB7B675F6E8B98F
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 26%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................... ......t*....@.............................................HO..........XE..X)...........................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...HO.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):276312
                                                                                                                                                                                                Entropy (8bit):6.154630648840684
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:+I5Nzd7398vxuYr+kdRYDuSLRWaexv1z9uZJGYzKor7+rPmQX73f0PNXLRejbxsv:VeYDzLMamRoZJ5WPLmLixg
                                                                                                                                                                                                MD5:3141E8E75FE71E17B1337CB97B37AB03
                                                                                                                                                                                                SHA1:97196EF68387DBDD483809D0A24D0DF4794144FD
                                                                                                                                                                                                SHA-256:C810AEF32F3C49F16AD2F1B187C47A069BB686AF1428F5D1800BF2B60C1FD1A3
                                                                                                                                                                                                SHA-512:E9A0734335816E4F7D77AB77D4C5AD9B2FC5F7D726E96FE0DFA1AC46F20993062E974E19025705E06C501576B2FA1F16D4998F75CE8A5ED6A7631F17C1E7CE2A
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^S.0.2.c.2.c.2.cQJ.b.2.cQJ.b.2.cQJ.b.2.c..b.2.c..b.2.c..b'2.cQJ.b.2.c.2.c.2.c...b.2.c..sc.2.c.2.c.2.c...b.2.cRich.2.c........................PE..d...Zp.f.........."....(............L,.........@.............................p.......k....`.....................................................x........G......t1......X)...`......pO..p....................Q..(...0N..@............................................text...T........................... ..`.rdata..............................@..@.data....%...........|..............@....pdata..t1.......2..................@..@.rsrc....G.......H..................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2312704
                                                                                                                                                                                                Entropy (8bit):6.449649685576397
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:49152:gg6wrmvfu6ZPfRFq8BcvDEzT3CuaMUgKS:H8Zn3Ci
                                                                                                                                                                                                MD5:E472E46BDFD736351D4B086B4C4CA134
                                                                                                                                                                                                SHA1:1AA886F0CB23B3D322A43BE797D411FCA84D82A7
                                                                                                                                                                                                SHA-256:E825A252B5C5C9C2DE8A6A6ADE12A7F9CD0040F6A20E6EE44BA659034E6D5223
                                                                                                                                                                                                SHA-512:173F5A7ABDFEA01C9C21EC716CBA14EEC4539DA45E5734B3FD1E0688E1C22E4718BD701C25C8040D20CF48867E2A67EF2ABA46380BAB9AB1F7A42BD66FD33AFB
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........."..........R.......R.........@.............................0$...........`.........................................',.......,..d....0........................$.@!..l...8...................@...(.......8............4..........`....................text...X........................... ..`.rdata..............................@..@.data............F..................@....pdata..............................@..@.gxfg...P........0..................@..@.retplne.............N...................tls.................P..............@....voltbl.D............T..................CPADinfo8............V..............@..._RDATA...............X..............@..@malloc_h0.... .......Z.............. ..`.rsrc........0.......\..............@..@.reloc..@!....$.."...(#.............@..B................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):9560433
                                                                                                                                                                                                Entropy (8bit):4.8475056659478915
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:/28lTEaiPJK0PJgVEv+F26vbV2f2EvYvAKMc/+uBPJ1PJLPJ1PJOPJDKspVosXxY:/2ETWgqSq+sIp2+qO1McdLRPiY2zXO
                                                                                                                                                                                                MD5:7A32B7C762C76BD3EE38E3E998705899
                                                                                                                                                                                                SHA1:E1C611A57115374A48CD84619BD06E43021B7352
                                                                                                                                                                                                SHA-256:726276A62DB14DD751F32B77200E90A8000712BD256ED038BEA928C6AEF0C892
                                                                                                                                                                                                SHA-512:9FE66FE4479915B0EFE12ADFB386BA251B2C2AF8CCD92B4D67F61C9D2AE537C6D3512E4379AFF10EAB3CD433FC1EDEC702E63DDFE4F83769A746FF249288D4DA
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview: Generated by licenses.py; do not edit. --><!doctype html>..<html>..<head>..<meta charset="utf-8">..<meta name="viewport" content="width=device-width">..<meta name="color-scheme" content="light dark">..<title>Credits</title>..<link rel="stylesheet" href="chrome://resources/css/text_defaults.css">..<link rel="stylesheet" href="chrome://credits/credits.css">..</head>..<body>..<span class="page-title">Credits</span>..<a id="print-link" href="#" hidden>Print</a>..<label class="show show-all" tabindex="0">..<input type="checkbox" hidden>..</label>..<div class="open-sourced">.. Chromium software is made available as source code.. <a href="https://source.chromium.org/chromium">here</a>...</div>....<div style="clear:both; overflow:auto;"> Chromium <3s the following projects -->..<div class="product">..<span class="title">2-dim General Purpose FFT (Fast Fourier/Cosine/Sine Transform) Package</span>..<span class="homepage"><a href="http://www.kurims.kyoto-u.ac.jp/~ooura/fft.html">h
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4916712
                                                                                                                                                                                                Entropy (8bit):6.398049523846958
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l
                                                                                                                                                                                                MD5:2191E768CC2E19009DAD20DC999135A3
                                                                                                                                                                                                SHA1:F49A46BA0E954E657AAED1C9019A53D194272B6A
                                                                                                                                                                                                SHA-256:7353F25DC5CF84D09894E3E0461CEF0E56799ADBC617FCE37620CA67240B547D
                                                                                                                                                                                                SHA-512:5ADCB00162F284C16EC78016D301FC11559DD0A781FFBEFF822DB22EFBED168B11D7E5586EA82388E9503B0C7D3740CF2A08E243877F5319202491C8A641C970
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........|3..]...]...]..e\...]...\.5.]..e...]..wX...]..wY...]..e^...]..eX.y.]..eY...]..e]...]..eU./.]..e....]..e_...].Rich..].................PE..d...^.}`.........." ......8..........<).......................................K.....:FK...`A........................................`%G.x....(G.P.....J.@.....H.......J..%....J.....p.D.p....................S<.(...pR<.@............S<.(............................text.....8.......8................. ..`.rdata...F....8..P....8.............@..@.data...`....@G......@G.............@....pdata........H......@H.............@..@.rsrc...@.....J......@J.............@..@.reloc........J......PJ.............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2028032
                                                                                                                                                                                                Entropy (8bit):6.64708834859118
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:x+QrVq8lxXjKAri3/8XLpvdZ4RAfdDY0K1w/cjWsdSJNTtMfxTCC:pdlNBfXt16RsFY0K3jWsdQVtM0C
                                                                                                                                                                                                MD5:5FFF6F0423A38BFAF174CB670650F4F9
                                                                                                                                                                                                SHA1:13ECD1C4784A5A178A998E9FC0DC08F556121712
                                                                                                                                                                                                SHA-256:D4E6FC4E1BC6CB5B3EF7010E61D3A65E97804FB20346CEE657688339075B2727
                                                                                                                                                                                                SHA-512:E6FF0EA9F6196470F6E094D0AB655FB527C28FC2B2A5D126A10C1F4185C0DFF5ED4F19E7ED717D67DF324562B7AA56ED87AA0BD396A6BA722D3141B9F30FC41B
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .........D......0.........................................c...........`A.........................................T.......Z..(.....c.0.....b..|............c..2...<..8....................;..(....<..8...........8^..`............................text............................... ..`.rdata..\7.......8..................@..@.data....D......"..................@....pdata...|....b..~..................@..@.gxfg....,....c.....................@..@.retplne.....@c..........................tls.........Pc.....................@....voltbl.8....`c........................._RDATA.......pc.....................@..@.rsrc...0.....c.....................@..@.reloc...2....c..4..................@..B................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):10717392
                                                                                                                                                                                                Entropy (8bit):6.282534560973548
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:196608:hpgPBhORiuQwCliXUxbblHa93Whli6Z86WOH:n8wkDliXUxbblHa93Whli6Z8I
                                                                                                                                                                                                MD5:E0F1AD85C0933ECCE2E003A2C59AE726
                                                                                                                                                                                                SHA1:A8539FC5A233558EDFA264A34F7AF6187C3F0D4F
                                                                                                                                                                                                SHA-256:F5170AA2B388D23BEBF98784DD488A9BCB741470384A6A9A8D7A2638D768DEFB
                                                                                                                                                                                                SHA-512:714ED5AE44DFA4812081B8DE42401197C235A4FA05206597F4C7B4170DD37E8360CC75D176399B735C9AEC200F5B7D5C81C07B9AB58CBCA8DC08861C6814FB28
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ......E.......E.......E..P/...E.../...E..P7...E...7...E...h...F...h.. F..Pi..0F......DF.....WF.....jF..P...}F.......F..`....F.......F.. ....F.......F..0....F.......G......G......(G.....;G..@...NG......aG.....tG.......G.......G..@....G.......G.......G.......G..P....G.......H.......H..P...2H......EH..`...UH......hH......yH..P....H.......H.......H..`....H.......H.......H..P....I.......I......-I..@...=I......PI......aI..@...uI.......I...0...I.. 1...I..p1...I...e...I...e...I...i...I..`i...J...i..)J...K..BJ..p...^J..."'.uJ..P.'..J....'..J...5'..J..06'..J...>'..J..P?'..K...D'..K...F'.0K...H'.IK...V'.hK....(..K....(..K..P.)..K....)..K..pW*..K..P.*..L...*+.?L..p.+.bL....+..L...U,..L....,..L....,..L....,..L..@.,..M....,.-M..P.-.IM.. e-.`M...e-.~M...R/..M.../..M..0.0..M..@.0..M..P.0..M....0..N....0.!N...,0.9N...,0.NN..0-0.fN...-0.vN...Y0..N...Z0..N..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):454144
                                                                                                                                                                                                Entropy (8bit):6.3485070297294985
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:yLSe7mxAked1dLX9ValhL1IA9SbD/9PAE:yExAkedHLX9VC9OKE
                                                                                                                                                                                                MD5:7255FCCD39F330CA2123F380B4967E0A
                                                                                                                                                                                                SHA1:C8E0E1A3E129DF7AB8922F039FFDBBA20DFBA8E2
                                                                                                                                                                                                SHA-256:22C2E5452FB01513C331B9E88313830C96EB3E554FAB942AFCBD6FB8702DF730
                                                                                                                                                                                                SHA-512:ECD66B0A43AEFD2C4721CD574D2394A2A9069B5258E310A0FC16C3919FD2505BFE91DB2FF8E4B5C7EF0187C86B167004659D15943F5BE6DF42BBFC297FB42119
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .................7....................................................`A........................................`...h.......(.......x........A..............(...L...8...................0...(....)..8............... ............................text...2........................... ..`.rdata...}.......~..................@..@.data....O...`... ...H..............@....pdata...A.......B...h..............@..@.gxfg...`%.......&..................@..@.retplne.....0...........................tls....!....@......................@....voltbl.8....P.........................._RDATA.......`......................@..@malloc_h0....p...................... ..`.rsrc...x...........................@..@.reloc..(...........................@..B........................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):8058880
                                                                                                                                                                                                Entropy (8bit):6.448026576223661
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:98304:XUoMnbHa6h5CmPt75W2+G15kI6a7Xm3rC:gDTCe4rt/aTCr
                                                                                                                                                                                                MD5:6CD8726BEEFCFA69B48EAB1362A5CAD5
                                                                                                                                                                                                SHA1:F4249179B86C0A870C55E6C5A263180C77017E81
                                                                                                                                                                                                SHA-256:2636DA528EDCAEC9834255A92411BD5DA921D793825D74CEB997E336A0DBD393
                                                                                                                                                                                                SHA-512:0F6600315B0E1B5371BB39290E5417EBAA0F3C7FB47EEF32D73AFCE299722A426DD244FD3775D88FCEB6F170F16B23B099244EE825F7F8185D58F1BF28583515
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." ......^...........Z.......................................{...........`A.........................................2r.......s.d.....z.......x.HX............{.|...$.q.8.....................q.(.....p.8.............s.....@1r.@....................text.....^.......^................. ..`.rdata..d....0^.......^.............@..@.data.........s.......s.............@....pdata..HX....x..Z...pw.............@..@.gxfg....,...pz.......y.............@..@.retplne......z.......y..................tls....Q.....z.......y.............@....voltbl.D.....z.......y................._RDATA........z.......y.............@..@malloc_h0.....z.......z............. ..`.rsrc.........z.......z.............@..@.reloc..|.....{.......z.............@..B........................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):502905
                                                                                                                                                                                                Entropy (8bit):5.409605383978337
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:Mqyim2uho5EnirXKhaG1B2+H2JynyaH4IFzZo0vgElgA2W0PSq+2ss30fzO75g6p:U2uhounkXyd1B2+H2JynyaH4IFzZo0ve
                                                                                                                                                                                                MD5:8032CB8A1B40AC85ACBEAFD6514BE668
                                                                                                                                                                                                SHA1:EE15C360BD913FFEC94E9E36224548CA83B2564C
                                                                                                                                                                                                SHA-256:1762EB36E254C02A50ED089ED737235FD7A64C0D234581612ACA56F6398CAC97
                                                                                                                                                                                                SHA-512:956241DA1EE60C648417C6BF3921554F1F19AB17163DBDA764AE0DC21E1729C9357BFB900B1F948D2C649F9D53DA7CEFF3128B8CFAB34FD03053A8C37C663F5D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........$&).e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z.................................................................Y.................&.......................).................H.....]...........#.....X.....q.................9.....G.......................*.......................4................./.....L.................:.....L.................6.....E.................T.....j...........R.......................G.....d.....u.................,.....9.............................I.......................?.......................%.....m.......................6.....].....f.................(.....1.................`.....w.................:.....R.......................5...............................................P.............................~.......................~...................................p.................] ..... ..... .....!.....!.....!.....!....."....Y"....}"....."....."....9#....d#
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):813426
                                                                                                                                                                                                Entropy (8bit):4.915984741122479
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:dTZog2ule8/xHT9KG3Sj+KRRz0l85X9icV03OzP+Xx30jH8+j:/ogg8/xpKGCj+KRRz085X9icV03OzP+W
                                                                                                                                                                                                MD5:7B88BD642C86EC4D4FB9A5614D1DA63F
                                                                                                                                                                                                SHA1:92CF23267B78039E2413F7F7F90E6636614A0C5C
                                                                                                                                                                                                SHA-256:0C1DE970426BA291B10CD08FF0E6B078ADF4C1D07B24E0D89D9322FD2EC2E296
                                                                                                                                                                                                SHA-512:17E2381491A8844D1AD6910C3876C817ADE5CF2DAD8461771BAE9E967F7F64954917E20F8258CE6548AF1C21F8CF7E9477C7BCDCE6DD216140BF4D32410A31D9
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........?&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}.....................................................................................0.....O.....$.......................u.....-.......................i................................... .................\.....o...........h.................f...........7.....g.....J...........\........... .............................\.............................r...........l.....+.................Z.......................z...........".....5.................B.....U.......................?...........o ..... ..... ....r!.....!....Q"....g".....".....#.....#.....#....l$.....$....6%....F%.....%.....&...."'....H'.....'....;(....u(.....(....!).....).....).....).....*.....*....C+....\+.....,.....,.....,....E-.....-....'.....`............/...../...../.....0.....0....A1.....1.....1.....2....`3.....3.....4.....4....y5.....5.... 6.....6.....7.....7.... 8.....8.....8.....9.....9.....9....p:.....:
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):822020
                                                                                                                                                                                                Entropy (8bit):4.925237393732045
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:vFB3t9DiYK8a4HHFLrgOIPcd1CyWpQ5fuiDbmpQ:vn3t5SzU5fu+
                                                                                                                                                                                                MD5:621B390B8AF0C70D682715323A92B61F
                                                                                                                                                                                                SHA1:C34B2F2C91CD0786FEBBD26223D1CB096A87C1F4
                                                                                                                                                                                                SHA-256:729B677BE93020DDEF1297869CA7378D3A102927294C634A1087D63F48FB8A79
                                                                                                                                                                                                SHA-512:E55691ED5FBCEF7AA8330CABDA72E9D803E12784B661A42FFE3FF725FE663AEF62EED407FDC2269135437AB7AE047A6F0CCEAA90F2349073E554DD45C5F9D0BC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&g.e.....h.....i.....j.*...k.9...l.D...n.L...o.Q...p.^...q.d...r.p...s.....t.....v.....w.....y.....z.....|.....}.........................................................................3.....N.....j...........].....!.................t...........p...........S...........}...........R...........J.....q.............................x...........H.....a...................................n.......................4.................A...........%.....A...........q.......................g.............................&.....G...........D.................!.............................A.................^ ..... ....R!....j!.....".....".....".....#.....#....,$.....$.....$....2%.....%.....&....5&.....&.....'.....(....E(.....(....P).....).....)....W*.....*....%+....R+.....+.....,.....,.....,.....-......................D/...../...../...../.....0....:1.....1.....1....o2.....2...._3.....3....s4....J5.....5.....6.....6....Y7.....7.....7.....8....'9....}9.....9....!:.....:.....:.....;.....;....M<.....<
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):897122
                                                                                                                                                                                                Entropy (8bit):4.928723053414015
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:CIPFaBsPG/d/RXZwRq4fvPU7XUUk/K58N0j+JzIQ4pF:CIvAAC5h+c
                                                                                                                                                                                                MD5:3C8E3C5B1D029E9A01943DDBA053C37F
                                                                                                                                                                                                SHA1:785EE0C46B11A19C80770F2B310057E59D90C2E1
                                                                                                                                                                                                SHA-256:98CD654847FF28C0EE580A7374276EE5BD2A38DDE8F45ADFBACBD7917E4C026D
                                                                                                                                                                                                SHA-512:DCA2FC0BE678BEBF047DBAA5A71C01AD57F9B463E3F80DBFABC0937BCFDCEEFC8AE84FD415C40D0B6B713FFF24CEBFB84373ECDDE3741F78265E082C5B9951D0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%Q.e.>...h.B...i.M...j.Y...k.h...l.s...n.{...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................%.....-.....4.....;.....B.....D.....I.....b...................................o...........,...........#.....E.......................0.......................$...........?.........................................x...........\...........\...........n...........s.....C.......................(.....{...........J...................................4.....s.............................r.................1...........;.....{...........K...... ....u ..... .....!.....!.....!.....!.....".....#....r#.....#.....$.....$.....$.....$....w%.....%....C&....X&.....&.....'.....'.....(.....(.....)....C)....i).....)....d*.....*....C+.....+....:,....X,.....,....{-.....-......................./.... /...../....C0.....0.....0....91.....1.....1.....2.....3.....3.....4.....4.....5.....6....e6.....6....+7.....7.....7.....8....g8.....8.....8.....9.....9....k:.....:.....:.....;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):927865
                                                                                                                                                                                                Entropy (8bit):4.686646990438899
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:4Tax7YKC3cquMMLYzzQkECPUwVbtbHp373ZL+3aAKHkVDYyKzumpod2nm5g0XuGq:W8C3cquMMLYUKUwVbtbHp373Zq3arkV8
                                                                                                                                                                                                MD5:27C55B97D549BCF13145EC75F0A503CA
                                                                                                                                                                                                SHA1:4D7BEC85366FBB602EB6FC02297FB402BD40B6BF
                                                                                                                                                                                                SHA-256:F2EB47878B5D34589A2AFC2E74AB346003BF4D2C450230B9CFD084935BB54A4D
                                                                                                                                                                                                SHA-512:CA3ABB2403B8A67A53F2156E11C361B137F45378737E39D45D5F77148FF3CD031E37DB9EA144B76749667CBA20698C2049E86CA5927475B1E22112751B9BDF3F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........$&).e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z................................................................. .............................K...........................................................V.........................................^...........p...................................&.....n.....X.............................L...................................I.....\.....5.......................E ..... ..... ....R!.....!....5"....]".....".....#.....#.....#.....$....?%.....%.....%....h&.....&....<'....['.....'....n(.....(.....(....g).....)....#*....I*.....*....|+.....+.....+.....,.....-....}...........Y/...../....'0....W0.....0...._1.....1.....1.....2....w3.....3.....4.....5.....5....06.....6....L7.....7.....8....A8.....9.....9.....:....8:....&;.....;....;<....p<....`=....;>.....>.....?.....?.....@....7A.....A....LB.....B....?C....wC.....D.....D.....D.....E.....F.....F....hG
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1193463
                                                                                                                                                                                                Entropy (8bit):4.299730648702171
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:o3d2APzZl1uPXdf826YBWviytaGHFGuzhr0Ylf14/QISydDbrK8VBbFKQg51lNDS:o3d3Fl18fPAtt1MFSydHrK8VBbG5llA
                                                                                                                                                                                                MD5:7351AE61AE5884088AE68CE5BE0043D8
                                                                                                                                                                                                SHA1:DBEEA5DA228F63A405548F0E6F82FBBB3D624058
                                                                                                                                                                                                SHA-256:D367339A1AC5CE27E58AA03D33E567C06C02F4AC87DB26ACA5D8A3D915AAA01A
                                                                                                                                                                                                SHA-512:85D5D0372C162DE8660B4A8A4EC493585C6C3D29F999F1734C319532DB572A13C91C87320BE139F9FFA957ADD52CDC36584226FAF5AFC39F8A82A2E9C146156B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........%&(.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.'...w.4...y.:...z.I...|.O...}.a.....i.....n.....v.....~.......................................................................Y.................I...........z.....Q...........*.....O.....I...........F.....>.............................G.......................G.............................Q.................t...........Z.....I.............................K.............................]............ .....!....Q"....."....n#.....$....L$.....$....'%.....%.....%.....&.....&....H'....{'.....'....~(....-).....).....).....*....(+.....+.....+....s,.....-....g-.....-....5...........!/....D/...../.....0.....0.....1..../2....K3.....4....^4....X5....'6.....6.....6.....7.....8....L8....|8....J9.....:....w:.....:.....;....d<.....<....s=....->.....>.....?....??....$@.....@....-A....eA....hB.....C.....C.....C....)E....}F....pG.....G.....H.....I.....J.....J.....K.....L.....L....0M.....M.....N....7O....fO....lP....@Q
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):573774
                                                                                                                                                                                                Entropy (8bit):5.391859865204477
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:gQQL7QREpAp973K5PqF4N3Mw2juwHzejm0t3lvqbETX9/RSHhIsjcmlLEYuCJkdz:hb9zaBRnvWDMN8UpOO5k/mVb
                                                                                                                                                                                                MD5:F6E50323E0C5A657EBDC2FE7285C15F6
                                                                                                                                                                                                SHA1:944356D207A7962A81801BB76B0E2C5226FF7F1E
                                                                                                                                                                                                SHA-256:DE474CF24B68B6D862C96B8057EDE3F53C6F63C46532E4988E9D1979B1CF59DA
                                                                                                                                                                                                SHA-512:8BC4EA1E2EB03E0423A7C3008BF6001B904928B5B7D7E84D61469C8D8CDBD34E9A4FFFA900B7CBF4216FBA3A469D7A26AF9C22E618902C28044F426693B09EC7
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........"&+.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.$...y.*...z.9...|.?...}.Q.....Y.....^.....f.....n.....v.....}.................................................................9.................3...................................n.................P.......................T.......................K.....~.................y.................n...........$.....J.................^.....r...........,.....c.....w...........U.................Q...........5.....[.................<.....X.......................(......................................... .....5.......................1.............................[.......................>.......................^.................0.......................3.......................V.......................t.................Z.................. ....7 ..... ..... .....!....(!.....!.....!....6"....R"....."....w#.....#.....$.....$.....$....0%....Z%.....%....)&....\&....|&.....&.....'....='....P'.....'....((....h(.....(
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):583431
                                                                                                                                                                                                Entropy (8bit):5.838398613999325
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:eV2UufpvPlAhTbe65aU8rwsiNOA3SzmPN:eV2UufpvNAhHh5aU8rvYOrzmPN
                                                                                                                                                                                                MD5:7F1AD2897B210C4C25CFBDF0736F6809
                                                                                                                                                                                                SHA1:62E0335A63BC9E2AE8A9826E08256B00E433D9F5
                                                                                                                                                                                                SHA-256:E0826C8E2FE737307D09D808BC693A397E0F1E093AC249B24CEB48327685A4A4
                                                                                                                                                                                                SHA-512:C656B1FF7FCD93B3AEF5FC9E91373D0588520546EAF6CB5E2F965FD66ED0D60E2C04FB22155723D6EFDFDB377EF98CD6420F9944C5B0FC4AE8DE14C830A05B15
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&;.e.j...h.n...i.v...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.1.....9.....>.....F.....N.....V.....].....d.....k.....l.....m.....o.............................T...........G.....e...........).....^.....m...........p.................V.......................{.................$.....w.......................z.................7...........H.................$.......................N.......................w...........2.....G...........B.......................Q.....n.................*.....V.....h................./.....@.................F.....Z.................R.....d.................9.....F.................H.....[...........*.....d.....x...........m.......................`.....{.................0.....Q.....p...........7.....c.....y...........Y.......................w.................. ..... ..... ..... ....I!.....!.....!....."....t"....."....0#....B#.....#....T$.....$.....$....2%.....%.....%.....%....<&.....&.....&.....&....@'.....'.....'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):530651
                                                                                                                                                                                                Entropy (8bit):5.44607278354406
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:QnPhyMLsqSAzVWgss5sbse814eBjtwlRDdJwL2obEXZaFRQ5gk2rp/b3d4nTGqF5:WDgxsJjiT55g/r2Tpj
                                                                                                                                                                                                MD5:9D6A98D53208092F687AD7BB3DBAED7D
                                                                                                                                                                                                SHA1:161D0689CA85147B356167F98EAD84783E331986
                                                                                                                                                                                                SHA-256:04BF402123BFA1C7E256A62A666C0488A42ACEB585C1A9A744341EBC6FDD9A7C
                                                                                                                                                                                                SHA-512:B85832A3DBF5C97870683A655E2CB0F00C04DA4907644561894BB34DE9756334E60CAF75F0CB42E43692BF00C5EF3CFBE6D2E8F7802FFED8E6948757D2DE3E5A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........&&'.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................\.................".................@.....X...........d.................1.......................1.............................x.......................y.................<.......................w...........#.....6.................C.....W...........`.................]...........5.....[.................8.....J.......................#.....q.......................\.......................b.......................[.......................?.......................!.......................-.......................t.......................X.......................3.......................0.......................n.......................n............ ..... ..... ..... .....!.....!.....!.....!....:"....H"....."....Y#.....#.....#....%$.....$.....$.....$.....%....d%.....%.....%.....%....O&.....&
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):571551
                                                                                                                                                                                                Entropy (8bit):5.489447532911186
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:if1WFbCgp1nHaxa03K7UpKD93g/ahmOC2GzV6wAXaOV5jbt5sRqJoUaM5QIBCAL:wQAgnp03K7Up4g/a01JE3t5yUfvBCAL
                                                                                                                                                                                                MD5:851D55585CBC90143DD4C70EB4900574
                                                                                                                                                                                                SHA1:DA5DBD04CFEFE63D1DB69D7C6E19DAC34F379C39
                                                                                                                                                                                                SHA-256:DDBAFE037C6E7509650373D084BC0F198D3ABB7BFD93FAEDD5595F1B354EDC32
                                                                                                                                                                                                SHA-512:B1718430F3540F2455E93A1F6C47E92D7FEA99A9943E8C585EBD4DD807B5A4C1172BBDC83D434EE806C5FC3875B60D7EBDEB933D1CDE6DB50DCED9C0DAAFCD04
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.0...t.9...v.N...w.[...y.a...z.p...|.v...}.........................................................................................................................{...........;.....P...........H.................).......................e...................................:.....N...........T.................=.................!...........".....\.....m...........o.................V...........<.....V.............................z.................".................%.....7.................6.....G...........T.................!.......................S.......................|...........&.....5...........'....._.....q.............................w.......................q.................. ....o ..... ..... .....!.....!....)"....b"....."....."....c#.....#.....#.....$....}$.....$.....$....H%.....%.....%.....&.....&.....'....b'....l'.....(.....(.....(.....(....e).....).....*.....*.....*.....*.....+....)+.....+....(,....`,
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1016551
                                                                                                                                                                                                Entropy (8bit):4.766567786580532
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:WStxYcxPdGgxh1hxFFiL9+YJXDsSaSmqHuuD2Np6P4j/MAVH8yeVd85tRDQr3egJ:TtxYcxPdGgxh1hxFFiL9+YJXDsSaSmqv
                                                                                                                                                                                                MD5:F497F06BC0430F2FA1E2BFFC32E2B9C5
                                                                                                                                                                                                SHA1:38141C3F85FD4A8FCF2A82B0DEB68BD93F062F60
                                                                                                                                                                                                SHA-256:B3CB15115252BBF1363B7231ED32309C9E2E5B6EEEC1B2BBC2700A49A26E56D0
                                                                                                                                                                                                SHA-512:C455DE6466A9FA535C685163A6B4540DC00EB51CC5565ADDFB0E124E3A29CD4AFEC7AB9DF7848C9D3A6C7F435E1CC761F74D8F162D8BC7378D086E96EFA2E705
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........%&(.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.(...y.....z.=...|.C...}.U.....].....b.....j.....r.....z...........................................................R.....y.....W...........C.....>...................................X.................C.......................O.................k...........J.....j.....9...........X.......................(.....b.....4...........s...........u.....1.......................z...........0.....d.....\...... ....I ..... .....!.....!....!".....".....#.....#.....#.....$....<%....|%.....%.....&....m'.....'.....(.....(.....).....)...."*.....*.....+....1,....X,.....-.....-....'.....N....../...../....#0....D0....O1....W2.....2....%3.....3.....4....!5....V5.....5.....6.....6.....6.....7....(8.....8.....8.....9....Y:.....:....-;.....;....|<.....<.....<.....=....l>.....>.....>.....?.....@....!A....PA....zB.....C....KD.....D.....E....lF.....F....&G....6H....2I.....I.....I.....J....iK.....K.....K.....L.....M....zN
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):459985
                                                                                                                                                                                                Entropy (8bit):5.5152848417450615
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:HAeAGZgSZ+XKFELrqmjLCd3MP9ej7HXfaYISMv5n5CSEBcWRnFc:HjfZgseoEL5C3Ma7H6N5CSgc
                                                                                                                                                                                                MD5:F8EEEBF6B363D8578D769AA05FED5BA7
                                                                                                                                                                                                SHA1:12E8B6FE48CA49936769B766A9A13510D9569A20
                                                                                                                                                                                                SHA-256:1F7D3BEACD2A55F3BF2D3571BEF1D05FA333FADD9E6CA141C2525B0678824CDD
                                                                                                                                                                                                SHA-512:3AAE1B6881E50E88635336218D7C13ACF81687AD78FB902900746EB875D9DD29DBF83A1D51344DF617DD86E31BAAD04564460ECC48886308E742830412E8C71D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&..e.`...h.d...i.r...j.~...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.-.....5.....:.....B.....J.....R.....Y.....`.....g.....h.....i.....n.....{.............................~.......................|.................$.....}.................(.....t.......................J.....s.......................5.....B.............................v.......................l.......................H.............................^.......................^.......................*.....E.....T.............................8.....u.......................J.....|.................&.....S....._.......................!.....i.......................).....n.......................[.......................:.....].....s.............................{.......................J.......................1.....h.......................;.....j.....z.................W.....o...........B.......................X.......................N.....z.......................4.....D..................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):464664
                                                                                                                                                                                                Entropy (8bit):5.505055040425703
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:V0BSJCCPeiISZuw3jcMP9eD3D9faYLbcNx5FSZngP/eXywB:8SJDPeDIjcMY3DzA5FSHywB
                                                                                                                                                                                                MD5:4B6300C27E7575C32888C1F3364D5346
                                                                                                                                                                                                SHA1:C5F5E1D3524ACC96FB4E18C08B02F54ABF83C3D4
                                                                                                                                                                                                SHA-256:0945C89B16D4FEBA346E85E14792B772DCC6278F7DCA7FB099A6100C93E79740
                                                                                                                                                                                                SHA-512:3F21B6F4A3E18755B355CE5F20384D549B3F723104A67C67AE521D2C4544AA3095FADA8855A0CC1A10E7C5BF3E8F55D061AB2DCEC210F76101A61D9484D4EE6F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.&...q.,...r.8...s.I...t.R...v.g...w.t...y.z...z.....|.....}.............................................................................................................;.....N.................".....2.................-.....C.......................+.....w.......................<.............................E.....j.................4.....i.................".....S.....a.................#.....3.............................i.......................\.............................6.....U....._.............................e.......................F.............................V.............................>.....I.............................l.......................g.......................).....e.......................+.....M.....\.................5.....[.............................Z.......................?.......................;.......................`.......................a.......................+.....i.......................C ....t
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1031027
                                                                                                                                                                                                Entropy (8bit):5.210875521790238
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:HmdiMRfFgJWHLboEFFRyYHiLNQTCvXTOnXv1x7S6a8wGi4ADjn1VtuYtP01+Z5zp:H/sm5z9v
                                                                                                                                                                                                MD5:D5A14353A7FCC1F199F9234BD4551FF9
                                                                                                                                                                                                SHA1:7476E2846B6C0D03338A074D7FE325BB468992FE
                                                                                                                                                                                                SHA-256:E5CFEBD81831A65CA268866A8EEADB334F64FA3B0853BD550E5BB69724408FBC
                                                                                                                                                                                                SHA-512:BCE4FB535509834EA32ACBA72FC22B76CE591F9B6C1C15207B023460F59E9BC6F65118F816A82D235E7F20E26BF822EA102C95B5DA71FCFF099D56215945BD27
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&g.e.....h.....i.....j.*...k.9...l.D...n.L...o.Q...p.^...q.d...r.p...s.....t.....v.....w.....y.....z.....|.....}.........................................................................8.....[.............................k...........t.....=.............................f.................J.......................t.......................a.......................g.............................]...........i.............................P.......................q........................ ..... ..... .....!....."....O"....y".....#.....#.....$..../$.....$.....%.....%.....%.....&.....'.....(....[(....%).....)....a*.....*....C+.....,....s,.....,....R-..........~...........X/.....0....~0.....0.....1....x2.....3....M3.....4.....4.....5....J5.....6.....6.....7....J7.....8.....8....!9....K9....2:.....:....q;.....;....z<.....=....L=....r=....U>.....?....|?.....?.....@....EA.....A.....B....,C....8D.....D...."E....!F.....F....zG.....G.....H....dI.....I.....I.....J....RK.....K.....K.....L.....M.....N
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):560321
                                                                                                                                                                                                Entropy (8bit):5.366866302767652
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:jjxzJ7FnfONzx0T8puYnKwoR5g6qLFYUudBm+u:nP8/pQj5g64F4Tu
                                                                                                                                                                                                MD5:AAB525A7681AE93791B283205064E2B4
                                                                                                                                                                                                SHA1:A021DBDCD3F269B77D7133F47B63906FFF794F76
                                                                                                                                                                                                SHA-256:5EF4BB4558102F2E39669208BECE79FD5B474E0A87C8A1EED5BCD6B13DA6C6FA
                                                                                                                                                                                                SHA-512:841CD903FCF716692FF1873EDAC4FEB5F8B907AFEC1D0DEBFABB39255A74B9B2096FAE3E562E95893DAC731EF46D07B12B6A441975042981CC88638B7673B435
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........+&".e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.*...w.7...y.=...z.L...|.R...}.d.....l.....q.....y.........................................................................................v.................i.................Z...........7.....U...........B.......................B.....l.................<.....d.....u...........o.................n...........".....L...........).....n.................V.................)...................................j.................(.....W.....r.................K.....Z.................R.....h...........E.......................a.......................W.......................<.....l.....v...........D.........................................Y.......................c.................J.......................r...........) ....j ..... .....!....?!....Y!.....!....."....O"....h"....."....5#.....#.....#....*$.....$.....%....(%.....%.....&....z&.....&....#'.....'.....'.....'....5(.....(.....(.....(....7).....).....).....*
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):559178
                                                                                                                                                                                                Entropy (8bit):5.34611084339133
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:tMTZMKZuHswv12Jp/bNg86ip3+UxojFtnj45vzr700Iu96PZrk8jb:AZMKUGVVLpzojTnj45brY0sb
                                                                                                                                                                                                MD5:078BD56804D26C26E9AA4F41BF6549F6
                                                                                                                                                                                                SHA1:B1B575D34769F35CF28158BCB40C92264DECC551
                                                                                                                                                                                                SHA-256:99389110A1497D3999E8CB5799A629A471D221E07C2818CEFEEDB1C95BF5A9F3
                                                                                                                                                                                                SHA-512:4108B3BDED940A7D3939EE68DD489A4453391BAE548285867B81A50217C248280111853A1EB6838B6C079A01A74D11CEE61E7F441CBC6D7BA91F1DFAE3EE602F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t."...v.7...w.D...y.J...z.Y...|._...}.q.....y.....~.........................................................................................+.........................................v...........f.................c.......................u.......................v.................7...................................V.....t...........L.......................p.................@.............................#.....q.................K.....~.................@.....h.....w...........:.....p.................R.......................M.......................:.....k.....v.................N.....X.................E.....U...........C.......................Z.......................T.....{...................................A.................1 ..... ..... .....!.....!.....!.....!....."....."....."....."....>#....X#.....#....l$.....$.....$....o%.....%....:&....c&.....&....F'.....'.....'.....'....@(....f(....y(.....(....J).....)
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):509452
                                                                                                                                                                                                Entropy (8bit):5.455817407928288
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:Z0izVKnUJ1HNRSUSx+DuM/Fb0WmFosQ4Eqsoh7Pwiw4dQH5ejnrlvCKMvaKWcEzn:vVKi7S65JmFosZtQH5ejJsW
                                                                                                                                                                                                MD5:45E28E64378FABED845EB242A8F1563D
                                                                                                                                                                                                SHA1:8FAA0651CA0D29596CA294DC448CB870D553C0FF
                                                                                                                                                                                                SHA-256:68386C75B1E414B5F94E1AA5EB9A98A42B6298177FABB834A8B9E96E1EF70A2D
                                                                                                                                                                                                SHA-512:3165EC45C2958C382832E4528D38966C28CA90C84777FD48D762FBD75F31FD52BD1B2C069BA4644504913219FAD5DDC08980F69DC67B9AB03D392AFC1321C339
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........:&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.!...s.2...t.;...v.P...w.]...y.c...z.r...|.x...}...............................................................................................................................t.................&.......................I.......................I.......................;.......................=.......................M.......................w.......................{.................'.................).....A...........6.....{.................W.....y.................=.....`.....l...........!.....K.....[...........).....c.....n...........5.....o.....}...........6.....g.....o.........../.....b.....q...........0.....d.....l...........T.......................U.....t.................H.....l.................<.....t.................I.....}.................L.....f.....w...........;.....c.....{...........G ..... ..... .....!.....!.....!.....!.....".....#....I#....n#.....#....J$.....$.....$.....$....-%....I%....]%.....%....+&....Y&
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):825360
                                                                                                                                                                                                Entropy (8bit):5.0557125829631335
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24576:FqvG8u313uyqoT+s1qLpRmX1loT4RmdAQifaQ2XxFMJGk620dri1HMX9O9xdpxHk:Evpu55M
                                                                                                                                                                                                MD5:A13029CB1D5873121E6BDD0929A6C772
                                                                                                                                                                                                SHA1:7B88AE77DF959B8C01F5F00F2B0DFC30ED0A85EA
                                                                                                                                                                                                SHA-256:2527D1821D08E43D2F1259A1F910AF986632B8AEF9257D2FC37BC285AF7EE217
                                                                                                                                                                                                SHA-512:AF272D021316A71CF2A98126AF9CA993122B3B7B766C6D34003BCDC2FC5936BC4FAE95293B1D74FE35A0C81150D45E95ADABC4B34118974D214049FCDBEE74CA
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%p.e.....h.....i.....j.....k.*...l.5...n.=...o.B...p.O...q.U...r.a...s.r...t.{...v.....w.....y.....z.....|.....}...................................................................%.....A.....k...........w.....H.......................M.......................]...............................................K.................=...........#.....D...........}.......................O.................Y...........E.....a.................................................................*.....N...........W.................,.............................!.....c.....z...................................@ ..... ..... .....!.....!.....!.....!.....".....#....R#....t#.....$.....$.....$.....$.....%....I&.....&.....&....L'.....'.....'....!(.....(....h).....).....)....}*.....+....j+.....+....>,.....,..../-....u-.....-....k.................e/.....0....a0.....0....&1.....1.....2....%2....#3.....4.....4.....4.....5....N6.....6.....6.....7....98.....8.....8....39.....9.....9.....9.....:....G;.....;.....;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):517467
                                                                                                                                                                                                Entropy (8bit):5.424845538875905
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:RKUtqd19KJOKu4ar5HZ7kfCHEpyWaZ7WYM:Ntq8S5HFHAl
                                                                                                                                                                                                MD5:E7B72F44D711DECE8E3043173A553AC4
                                                                                                                                                                                                SHA1:892424E4E011AAC47B068F9FD929B5E41BCCA525
                                                                                                                                                                                                SHA-256:5F1A9DF87400AF56F748026F3BAAA41756A4C42FCE4791AABFE2087441689340
                                                                                                                                                                                                SHA-512:A2907B8E12CCDD0FC5601C37F23CCD5556B4EAE18CB1833481D01B39B30EC643167B0C8295EC9EE8CE851B0C7968E83F9C47C6E1D4543A371A62485D1832835A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%..e.....h.....i.....j.....k.....l.....n.#...o.(...p.5...q.;...r.G...s.X...t.a...v.v...w.....y.....z.....|.....}.....................................................................................'.....@...........E.......................s.................(.......................O.......................Y.......................7.............................\.........................................9.......................5.......................8.......................X.................&.............................[.......................!.....k.......................;.....e.....o.................N.....[.................#...................................l.......................a.................0.....~.......................K.......................A.......................?.......................I.............................f.......................^.................7.................................... ....2 ..... ..... .....!.....!....p!.....!.....!.....!....7"....."....."
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):584976
                                                                                                                                                                                                Entropy (8bit):5.195604084490558
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:4ln56kcajNxYUC36tIQy7DQEuq2V8L0dnGNLmG5eXmi1YARFtK:KnAkcmqnxEG5omt
                                                                                                                                                                                                MD5:F7F3CC17509AF03E639E983A091C2026
                                                                                                                                                                                                SHA1:D36E61E50B5FA99BE2A3C3727AFEB142969C8308
                                                                                                                                                                                                SHA-256:5D586C9BFA38452CDFB50BF5D2E9B98E68A8E7CC73E4D641D8FD6BB3E7EC5712
                                                                                                                                                                                                SHA-512:5A2C037D0AFDC82A4ECA642F43CC10E0040B7F97BE9DA14A8F806970C1E07BEC9CD69AD816A91A41946F35FF7A760ACC65DF21F6CD9D365ACBBA345FF0C1FF70
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v./...w.<...y.B...z.Q...|.W...}.i.....q.....v.....~...................................................................................-.................(.............................4.................5.......................h.......................u.................+...........+.....i...........+.................#.................[.....q...........[.................1.............................5.......................s.......................i.......................R.....|.................h.........................................&.......................(.......................).......................M........... .....=................./.....M.................. ....! ..... ..... .....!....2!.....!....'"....n".....".....#....l#.....#.....#....&$.....$.....$.....$....j%.....%.....&....A&.....&....u'.....'.....'.....(.....)....S).....).....)....d*.....*.....*.....+....j+.....+.....+....",.....,.....,
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):606342
                                                                                                                                                                                                Entropy (8bit):5.380118288987104
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:n2sEZLqUMDpDgEL6QuaMVWXKz05qlZQmZyMYnYtkL09ujzxRe5hxkJSW7v40wCJ/:zj2VIN5JL
                                                                                                                                                                                                MD5:326917C8F37FE85E58AD3DE991D17A78
                                                                                                                                                                                                SHA1:683ED0FB95F33DC2B095E774AD3DE84B0E4A63E3
                                                                                                                                                                                                SHA-256:CFA45E5F86F70AE4D47D82BCEC6C245E618212E67CE8B7BF0A1BE0BE41C6E6E8
                                                                                                                                                                                                SHA-512:3FDF2B1C8031A06D5140449E22861545CC80E1417A70558DB2ACAC25733AC156A0D7941B053A7CFFB2ED193BBE5E0CAE4F1F68437FA570C612BE606DD10ECAE1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&<.e.h...h.l...i.}...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z. ...|.&...}.8.....@.....E.....M.....U.....].....d.....k.....r.....s.....t.....v.............................Z...........z...................................k...........P.....l...........G.......................x.........................................c.................>...........).....l.................n.................&.......................\.................-...........Q................./.......................0.......................*.......................B.......................[.......................^.......................K.......................D.......................o...........S.....j...........0.....^.....|.................4.....R.................X.....t...... ..... ..... .....!....[!.....!.....!.....!....[".....".....#....!#.....#.....$....Z$....z$.....$....x%.....%.....%....f&.....&.....'....>'.....'....I(.....(.....(.....)....^).....).....).....*.....*.....*
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1177779
                                                                                                                                                                                                Entropy (8bit):4.338116428198543
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:C3T12vbLPxCoYITYsRvc38ZUd02GHIwjAwREJKVMjNiT7llj63rhJXlPCKMi5eWt:dTbYITncQi02JCWJL5DAhc2T2
                                                                                                                                                                                                MD5:D77AEE1AB6AF4FC83813A69D3CA61E46
                                                                                                                                                                                                SHA1:C0786021AF8C8BBB083E9C4104B68BD28537893A
                                                                                                                                                                                                SHA-256:5D5E20C5F0CA21D8F1824EEBE8E595FAD4D0E601B224F4433B355A21B643971F
                                                                                                                                                                                                SHA-512:78C2589BC37594236D5B01C4C6C0CB934CF9CCAE15679159E1BCE64E3F5A3C903F9F7127D0DA8C317FD085A70EDFFDCAC413B4F2627BF14B862794B47BBA042A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........+&".e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.&...v.;...w.H...y.N...z.]...|.c...}.u.....}.............................................................................(.....`.................j.................Z.................F.....).............................#.....L...................................=.......................U...............................................|.............................E.....q.....n.....i...........+.....N.....\ .....!....D!.....!....n".....".....".....#....H$.....$.....$....O%.....%....?&....X&....$'.....'....=(....h(....$).....)....?*....a*.....+.....+.....,....),.....,....}-.....-.....-..........S/...../...../.....0.....1.....2.....2.....3....74.....4.....4....;5.....5.....5.....6.....6.....7....08....V8....a9....,:.....:.....;.....;....s<.....<.....<.....=.....>.....>....)?....)@.....@....mA.....A.....B.....C.....D.....D.....E.....F....vG.....G.....H.....I.....I....*J.....J.....K.....L....4L....SM....0N.....N
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):728589
                                                                                                                                                                                                Entropy (8bit):4.658856122190603
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:W5SDjhr3FluYMy31frspm29Wqu/kQl4JACVXbfeQCajLn5l67co+oiNB05elmmdi:W5SdY5/oP
                                                                                                                                                                                                MD5:04C846A7F65C1E95E49CFE69EC9EEB45
                                                                                                                                                                                                SHA1:78142FD5545EE76B1F90FF5DF6FB7C01D797F3D1
                                                                                                                                                                                                SHA-256:AFAFB0DADD253E7F665FCB0D9D562D243E32D774B6ABDF602B66734F310E689B
                                                                                                                                                                                                SHA-512:029F45EE02DAD7D3431B223F5516937E34D685026488BA2DBF7C43FFDEDD1240FA119C349E4F5052CA3FDE109215D6D8813A43297A7E4EDB5D9B063192AC775A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%N.e.D...h.H...i.Y...j.e...k.t...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.............!.....).....1.....9.....@.....G.....N.....O.....P.....R.....i.......................}.....3.................g...........%.....>.........................................a.................x.................E...................................=.....m.........................................s...................................q...........8.....Q.......................E...........+.....V.................m.................I...........!.....8...........*.....j.....}...........s.................B.......................s........... .....3.................\.....o...... ..... ..... .....!.....!.....!....."....?".....".....#....>#....b#.....#....Y$.....$.....$....g%.....%...."&...._&.....&....''....H'....a'.....'....D(....u(.....(....4).....).....).....*.....*.....+.... ,....D,.....,....l-.....-.....-.........../....b/...../.....0....u0.....0.....0....~1.....2....k2
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1250127
                                                                                                                                                                                                Entropy (8bit):4.3103395858193565
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:AubcffOrA0yUdRSM7vyWYfbXpgTMoV/BB0ZV1d1AuxXRLiW3Jk1eTByntDPtDl+U:AuAf2E0yjUv3MlgTMJem05f5xhbv
                                                                                                                                                                                                MD5:114BBD0D21C90DDFCE1D6E26432B7B9C
                                                                                                                                                                                                SHA1:EBFC476B4D742D9FDF5D0E78996748497EB0B4FF
                                                                                                                                                                                                SHA-256:E2321752811548A92EF069E53ABE349CAA93BE5596A2579DDE65391EE7CF915B
                                                                                                                                                                                                SHA-512:6195FC185F8297CA1C38B79339F86F0788B342A90B0E98F1ED5883CBE61725000B1653E911EB749351BB74802B8E75199DCF0C95D903A4422755E809A6A1814D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%_.e."...h.&...i.7...j.C...k.R...l.]...n.e...o.j...p.w...q.}...r.....s.....t.....v.....w.....y.....z.....|.....}...........................................%.....,.....-...........0.....R.....w.....................................................g.............................8.....+.............................6.................~...........y.................+.............................8...........^..... .......................W.......................................... ..... .....!.....!....."....y#.....#.....#.....$....b%.....%.....%....s&.....'....M'....f'....=(.....(....b).....)....R*.....+....d+.....+....3,.....,....3-....O-.....-................./...../.....0.....0.....0.....2.....2.....3.....3....x4....#5....p5.....5....76.....6.....6.....7.....7....n8.....8.....9.....:.....:....A;.....;....O<.....<.....=....]=....Q>....-?.....?.....?.....@.....A....BB....zB.....C.....E.....E....+F....9G.....H.....H.....H.....J.....J....~K.....K.....L.....M.....M....:N....7O.....P.....P
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):562949
                                                                                                                                                                                                Entropy (8bit):5.503469092776888
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3072:5pEDgLd6TlZ/9yZuYUapEXgaBV08L7SkK7D+wwWrDfB+uhAxqOSAq6+xMcwd0uPJ:HEDjTMzU0EV7xHwPBhbKBc5ag7yIjR/K
                                                                                                                                                                                                MD5:54308E58D399D0F1C4E66A4A4B6E3B59
                                                                                                                                                                                                SHA1:8DFCE74D45801654531C78E34CF6A6C2E4BA5556
                                                                                                                                                                                                SHA-256:8141D126CD8ED7CD29B998E4A778E81AEC043BC126B5D2B0FB62F95C5FBF1F62
                                                                                                                                                                                                SHA-512:33C74ACE0F430D2E7963512075007DCA70ADCDD43FCE31A27F925351CEB00CFECE329EC5E9B60DACFF7E28DA322FC9CEFF3FCD9AE3A7BB6655400F1A580C3EA2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........F&..e.....h.....i.....j.....k.....l.....n.....o.....p.'...q.-...r.9...s.J...t.S...v.h...w.u...y.{...z.....|.....}.......................................................................................................C.................0.......................c...........#.....B.................R.....h...........".....T.....d.................2.....B.................G.....l...........i.................D.......................k...................................L.....g.............................e.......................C.............................U.....v.................I.......................D.....r.................L.......................A.....l.....|...........'.....T.....d...........T.......................Z.....|.................@....._.................(.....U.....l...........K.......................m.................. ....u ..... ..... ....G!.....!.....!.....".....".....#....t#.....#.....$....n$.....$.....$....9%.....%.....%.....%....'&....p&.....&.....&.....'....|'.....'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):605952
                                                                                                                                                                                                Entropy (8bit):5.638270541961174
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:n0L6iTfLsgtbgq0LcP9wHs8DfcAujkatvV5RvBFZfpduYG3b7ZNIeHK9njDi59Rj:iTfrtcFQA0V5RvBn0zzKY5u0vv
                                                                                                                                                                                                MD5:B7AA52653BBABCC713A03067E6FCFCC3
                                                                                                                                                                                                SHA1:B18CC0B968C4C0F156E33F5C493E6C09760161DD
                                                                                                                                                                                                SHA-256:244BE241E2FD68882ADB0C1A1C4AE93B1406AE22CCC14BCB37FC09FE3C2831A5
                                                                                                                                                                                                SHA-512:CB393247F79F1A6CDD685AD9729D0C7FD3BFADB5591CD822A4F92BA19448E50C148517DC0DDC14C37243CC0145A5AB17D27C45CCEBDCCB76CEC70C1B444D07C0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&L.e.H...h.L...i.]...j.g...k.v...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.............#.....+.....3.....;.....B.....I.....P.....Q.....R.....W.....g.....}.................T...........u...................................f...........L.....f...........^.........................................(.......................{...........-.....^.............................s...........(.....:...........!.....c.....s...........v.................k...........W.....v...........j.........................................).......................q...........M.....d...........n.................>.................+.................W.....l...........r.................C...........(.....>..........." ....I ....e ..... ....0!....\!.....!.....!....L"....."....."....4#.....#.....#....&$.....$.....$.....$.....%.....%.....%.....&.....&.....&.....'....c'.....'.....(.....(....%)....4).....)....[*.....*.....*....s+.....+....:,....V,.....,....$-....U-....q-.....-....b.......
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):500354
                                                                                                                                                                                                Entropy (8bit):5.374540321275158
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:HDTG/Veh932Bmcwf/yG+wFZf+MVnjHF3mmi8IxZ5GZhWwkK5cTSzo7IEji4JHw:HHG8h94sXyMFTVnjHFWmNIb5GZhow
                                                                                                                                                                                                MD5:0EFA0011CE0365AE4AFC08753F559098
                                                                                                                                                                                                SHA1:6AFC5115DFC222F0F2B2265A591B571803787DCA
                                                                                                                                                                                                SHA-256:A780C4E8E48CBDF2064CFF3E9E025103739B3763E3B82DDD99C97DFFF8FB1CE2
                                                                                                                                                                                                SHA-512:21C34901F5260606F14FE0E004851AF4DFA6960C28872417FB995ADAC4B2652609D9C0F5F30C0F76F4287217ADCDC0ACF1545CBD4E5A6F4B15565668840BCB75
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................@.......................`.......................Q.......................m.......................p.......................N.......................8.......................@.......................4............................._......................._.................!.......................(.....e.......................$.....I.....U.......................!.....|.......................c.......................>.............................e.......................L.....~.................?.....u.......................(.....9.............................b.......................C.......................'.....c.....}.................=.....k.....z...........6.....r...................................Y.......................l.......................B ..... ..... ..... .....!....q!.....!
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):558299
                                                                                                                                                                                                Entropy (8bit):5.272942823509238
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:qrF11tFO6w7oWhI7xO2/IJ/jNLiISIqRRRsO1StiRT9TjexKqcQxLcaPpzHi9fLN:u1tFFehoXFZxR8g26sjoh59koF
                                                                                                                                                                                                MD5:12FFE0FC0BE1B4134F219BD3B6D8F550
                                                                                                                                                                                                SHA1:DC14159AEA6643FEED260C3E3EB9BF4286FFFD9C
                                                                                                                                                                                                SHA-256:4FFAADC42BB0F78B78061EEC23B39BEBF34BA3B9B4F2CD0415FD3C94B2C828D3
                                                                                                                                                                                                SHA-512:423EB3AA074617C8FB64EA909CF860C8706B73B5CBC97D85D21E9298DC53CF9451DECCB1DE45B19377E8E2461D78282D587264340BCE8F487AD48B0DDEE55123
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........)&$.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}.........................................................................................w.................X.................2.................'.................g.................(.....O.....].................$.....3.................L.....v...........n.................X.......................y.................".................?.....X...........R.................'.....s.......................W....................... .....G.....R.................\.....n.................J.....U................. .....).....x.......................Q.......................Z.................,.............................U.............................d.................(.......................c.......................>.....|.................J ..... ..... .....!.....!..../"....."....."....<#.....#.....#.....$.....$.....%....W%....m%.....%.....%.....&..../&.....&.....&....:'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):677279
                                                                                                                                                                                                Entropy (8bit):5.7261443457831875
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:5mNTLdjIcq5eHWv0WSGRBZ6Q2T+NbX5+Fo1Vi:5mNTxqe2ccBZ6Q2T+h5+FF
                                                                                                                                                                                                MD5:A92DA679A63FB99BB5F3BCF829168D21
                                                                                                                                                                                                SHA1:F15AA9BA6A952490DD881C82DED179FE03E50E80
                                                                                                                                                                                                SHA-256:F78FEB7523A3B4C795AC02EB66FD455B0F490257549D681B7AA07255E99AB9D9
                                                                                                                                                                                                SHA-512:3055528033206B6F32371A1BA05633614C0A3A9AF4FE2326FA3E6689BF535D5D540D926E08963FB668B02EEFF216DC2ECABED035C821C83E5D96CD2ED1531835
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........e%..e.....h.....i.....j.(...k.9...l.B...m.J...o._...p.l...q.r...v.~...w.....y.....z.....|.....}.....................................................................................1.....O.....p...........+.................'.................Z.....r...................................|.............................9.....K.................F.....V...........R.................@.................%.................8.....H...........#.....T.....c...........D.....{...........3...........5.....P.................6.....R...........S.................A.................*...........d.................`...........2.....A...........=.......................}.................P.................1...........j.................j............ ....: ..... .....!....Q!....r!.....!....^"....."....."....f#.....#....*$....d$.....$.....%....>%....M%.....%....R&.....&.....&....''.....'.....'.....'....z(.....).....).....).....*.....*.....*.....+.....+....1,....w,.....,.....-.....-.....-.....-....k...........4/....O/
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1341496
                                                                                                                                                                                                Entropy (8bit):4.250874916501427
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:v/9cYunn57Dz6f03QIBR0UInI7L5IazUG4pt+h9lcQ:nCYu5i25PUS
                                                                                                                                                                                                MD5:F13C1631BB1E180C07CB10C5142CEC74
                                                                                                                                                                                                SHA1:BD3B971893D3CE2206EDD040ED0EAB9BA010BD18
                                                                                                                                                                                                SHA-256:3A63D9B5BDECE8442ACA6971771A660BCEAE995CA96394FA88B024FEF3C93BF7
                                                                                                                                                                                                SHA-512:9122A55CE0E09ADAFE0162337B518228441D9A852E68761BFB62B656415F25386B3DB41279699F8035BE3BB3EA003FCBA91B5D5FC6EC538EF79E9486A488280A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........M&..e.....h.....i.....j.....k.....l.....n.#...o.(...p.5...q.;...r.G...s.X...t.a...v.v...w.....y.....z.....|.....}.........................................................................(....._.................j.......................A.....I...........X.........................................]...........Y...........P...........q.....:.............................q...........2.....A...........y...........S...........".....1 .....!.....!.....!....)#....?$.....%....Q%.....&.....'.....(....@).....)....r*.....*.....*.....+....@,.....,.....,....U-.....-....>.....S.....6/...../....w0.....0.....1....?2.....2.....2.....3....B4.....4.....4.....5....p6.....6.....7.....7.....8.....9....@9....b:....a;....!<....P<....3=.....=....Q>.....>....>?.....?.....@....,@.....A.....A.....B....`B.....C....PD.....D....eE....MF.....F....RG.....G.....H.....I....'J....yJ.....K.....L....TM.....M....(O.....P.....Q.....Q....8S....6T.....T....lU.....V.....W..../X....|X....IY.....Y....\Z.....Z.....[.....\....]]
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):569413
                                                                                                                                                                                                Entropy (8bit):6.084713993678112
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:OA7Ny//OV2Ngi7QFIyjxMSVG0GTin8t8OQ4E3hvaYrSCqD5tEp7YqGT8U13Xq7hy:OA7Ny/oZO5L8frCT
                                                                                                                                                                                                MD5:E8448C3D352C76C1C0F2B9F508852D9A
                                                                                                                                                                                                SHA1:2B7FE9F0A49FE3428E467A4214D0E7EC79CF7B52
                                                                                                                                                                                                SHA-256:30D515F2E086A7773DD3C7B5E6504729B6D91D9FA7174C3226EB3553F900BBF2
                                                                                                                                                                                                SHA-512:AE4144323E7EB2C2C97F336EE144C0C739CB5500F7FF382469CB4CE33DBAE35078EACD85F50381912C9D4367DFC9CBCB6C7C7BCE8314A0351B14F950A2209184
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........>%..e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s./...t.8...y.M...z.\...|.b...}.t.....|.....................................................................................................A....._...........8.....y.................p.................3.......................Q.......................V.......................e.......................v.................+.......................!...............................................+.................{.................D.....h.................%.....J.....Z.................%.....5.................W.....s...........7.....k.....{...........B.....v.................E.....u.................C.....t.................y.................:.......................*.......................5.......................O.................#.....t.......................?.......................B.......................U............ ....& ..... ..... ....0!....G!.....!....."....>"....Q".....".....#....$#....7#.....#.....#....($....;$.....$
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):611429
                                                                                                                                                                                                Entropy (8bit):5.6299671018290445
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:QQtetgAZbMAUbgO9aG1DT/G57szII1JgNf6SMM:QDgiMQzOG55IngN/
                                                                                                                                                                                                MD5:F6F5B593C91B7820C9552FFDDFAC03FC
                                                                                                                                                                                                SHA1:D771AC14A49C7654043D0AE2DC52239BF4636F65
                                                                                                                                                                                                SHA-256:FFE7EAC4BC39085977C28BF8BA0060B9A12471C3914A30DF1C46305926242BB6
                                                                                                                                                                                                SHA-512:45D3580D456F6972259055BFFEDE8745C922DFE2703BCF3A545E73211164E3CA594A56330A2A17EC373AB060C05A7776D88DFBAB5014081948A5F89A849F793C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........&&'.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................v...........d...............................................i.................z.................D...................................?.....V...........P.................3...................................D.....U...........C.....}........... .............................&.....t.................t.................#.......................N...................................E.....X...........L........................................._.................(.................C.....Q.............................h............ ....( ..... ....9!....s!.....!....."....."....."....."....m#.....#....*$....]$.....$....4%....V%....i%.....&.....&.....&.....&.....'.....(....J(....n(.....).....).....*....!*.....*....*+....h+.....+....&,.....,.....,.....-....j-.....-.....-................./....Z/
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):610750
                                                                                                                                                                                                Entropy (8bit):5.626685122127425
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:IbsBLMwr28cTB6aTmNstVFpM6Y97vccj/kbO153ySAbEwT4757esFOHAYXSIENAs:FL8PXVY9rrV15SEwTW5tOmAhm
                                                                                                                                                                                                MD5:8D8244CEA7D00E7502CFC62908147BB7
                                                                                                                                                                                                SHA1:2ECF5C264208555EC5BD4530544CC0AEE99F558F
                                                                                                                                                                                                SHA-256:C9722A6B132E9EF5BCA53565BCBC2CB3C40CB8954F2286250AD15FAFC0D2DCC1
                                                                                                                                                                                                SHA-512:B5B98ADE8D7EA25477D12CBEB6B1F07FEC5625583B8CC695755195B1EEF0D380C72AE4609955D230B4FD6109AA6B778421E7EAE9D7086FEC03CFF93C93D91791
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........J&..e.....h.....i.....j.....k.....l.....n.....o."...p./...q.5...r.A...s.R...t.[...v.p...w.}...y.....z.....|.....}.....................................................................................$.....@....................... .................T.....g.........................................Y.....x...........W.........................................O................. ...........e.................H.............................&....._.....r...................................*.....z.................f.......................o.......................}.................5.................$.................:.....L...........:.....q.................i...............................................#.....u.................P ....k ..... ..... .....!.....!.....!....5"....."....."....."....j#.....#....:$....t$.....$....A%....a%....z%.....%....~&.....&.....&....J'.....'.....(....%(.....(....|).....).....)....z*.....*....5+....[+.....+....V,.....,.....,.....-....r-.....-.....-....4............/
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1394062
                                                                                                                                                                                                Entropy (8bit):4.285571867304228
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:MYNjRdBR8QA2cMmsbbAx4LJxFq/ixn9mMy6UQ6KfUBp/AZCBEmeyo3ewhp5O47uW:RZRltMTKfUBpUyo3eo5O47xs4+3e
                                                                                                                                                                                                MD5:979090995F7F9DBFA9FA9A96349DA745
                                                                                                                                                                                                SHA1:6D9425EB6D3FF6B433A2FFD89DFFB3AEDCDE3588
                                                                                                                                                                                                SHA-256:C27AC1727F3A3A25ABED09CBF07DA604DD1C42A1855851E63DFCDC9831091EDD
                                                                                                                                                                                                SHA-512:4D734D7903DD4C39A2392EDA7B6A65929E61FE105ED843718D5CAF8D93DA9FF14A8908B896425335FCE9CA5AE717C29C80E7D85A2A6B80DF9F4FAC8F7A558F38
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........G&..e.....h.....i.....j.....k.....l.....n.....o.....p.)...q./...r.;...s.L...t.U...v.j...w.w...y.}...z.....|.....}...............................................................................b.................T...............................................c.................................................................\.....M...................................8............................................................ .....!....s".....".....#.....%.....%.....&.....'.....(.....)....2*.....*.....+.....+.....,.....,.....-....".....P....../...../....40....h0....J1.....2.....2.....2.....3....I4.....4.....4.....5.....6....#7....W7....C8.....9.....9.....9.....:....i;.....;.....<.....=....?>.....?....C?....-@.....@...._A.....A....\B.....C....PC.....C....nD....;E.....E.....F....BG....*H.....H....HI....,J.....J....TK.....K.....L.....M....NN.....N.....O.....P....IQ.....Q.....R.....S.....T.....T....&V....-W.....W....=X....kY....fZ.....[....Y[....J\...."].....].....]....+_....:`.....a
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1147816
                                                                                                                                                                                                Entropy (8bit):4.319695697825778
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:p+xh0ke1h+Fnhb0paSpgKZmTDAyyLj5QpYGde:p+TUA0paSppZ+Ayyf5QpYGde
                                                                                                                                                                                                MD5:7862ABEC5008FAC0A8924B65B3058C05
                                                                                                                                                                                                SHA1:BC6A3F405835E3F3290CB521CA2A9AC85EAECDC4
                                                                                                                                                                                                SHA-256:44056C45DE472FF1A5037FC24CC2417218CF4FA500B6A7158BD8AA221268B69F
                                                                                                                                                                                                SHA-512:C91A1DCC08EAECF7F99B37684E02F3F89D18DBAF24B2BF3849CE78965A38E8A995ABBA03C0F8F20420AA15519439F0C662165BAA6A31BFE3CF994AA51F67C8F8
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%O.e.B...h.F...i.`...j.l...k.{...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......#.....(.....0.....8.....@.....G.....N.....U.....V.....W.....\.....~.......................c...........Y...................................$.....Q.....'.....x.....~.....{...........4.................".....d.....0...........d.................l...........&.............................%.....(........................ ..... ..... ....."....3#.....#.....$.....%.....&.....'.....'.....(.....).....*....E*.....+.....+.....+....),.....,.....-.....-.....-.........../.....0....f0....N1....$2.....2.....2.....3....G4.....4.....4.....5....G6.....6.....6.....7....Z8.....8.....8....$:....M;.....<....N<.....=.....=.....>..../>.....>....t?.....?.....?.....@....^A.....A.....A....&C....!D.....D....7E....!F.....F....?G.....G.....H.....I....=J....~J.....K.....L....@M....sM.....N....#P.....Q....3Q.....R.....S....1T.....T.....U.....V.....W..../W.....X.....X....)Y....RY....sZ....g[.....[
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):524044
                                                                                                                                                                                                Entropy (8bit):5.251286724342732
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:SgRSValNdUMLjehAr7nQjBx7+27fldjiMIUcGm95AIHxOMVLLEWVHs:SOSmu0jeAnEx7BldPc95n0Mu
                                                                                                                                                                                                MD5:5EE8AEFF66C42600D73F9CB7D8366CCE
                                                                                                                                                                                                SHA1:DAB706F52B7F6099286D659EFC24ADBAD9F5A4F2
                                                                                                                                                                                                SHA-256:A87B9926FBC7C17D884ABE1D8E4B81335476B00FFE76196E38AF8542E2D7881D
                                                                                                                                                                                                SHA-512:96145B505C3726878162EF4AE328F08888F1CBCF3C3D8AADFCE4E72398651D1B120C4D219176E107F99BD682D968D3C8F02AA8BF600007033AAC07064127A8EA
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........S&..e.....h.....i.....j.....k.....l.....n.&...o.+...p.8...q.>...r.J...s.[...t.d...v.y...w.....y.....z.....|.....}.....................................................................................5.....L...........S.................'.......................;.......................m.................0.............................}.........................................*.................^.....v.................C.....L.................".....-.................&.....7...........(.....{.......................9.....K.............................i.......................O.......................\.......................U.......................E.......................5.......................C.......................f.......................N.......................).....u.......................^.......................>.....V.....b...........#.....T.....c...........0.....q............ ..... ..... ..... ....S!.....!.....!....."....k"....."....."....."....G#.....#.....#.....#.....$....o$.....$
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):508553
                                                                                                                                                                                                Entropy (8bit):5.428763068409714
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:h63MVtpURb8w5Op7fQ9S8GNxRV5/n4FJFEWt:h63MVXUa65GNxRV5f4jFP
                                                                                                                                                                                                MD5:40B668B73BBF3575D009F3D528D388E5
                                                                                                                                                                                                SHA1:E7186E4796216615F388C8A8058D898C4913F2FD
                                                                                                                                                                                                SHA-256:8813FA272B1A12042C75B97848605C8DA7D306AC7AAA4F231D41EE98D9E70538
                                                                                                                                                                                                SHA-512:8858E78493FBDBE1B2B99BCE75DAAC585F40EEA2612D80D82850F7957F0EF69C3A1F3DC7C011427CB1E64CD667031DEBD3B3D160BB9C2146224377A99B74798A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........*&#.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.!...v.6...w.C...y.I...z.X...|.^...}.p.....x.....}...............................................................................................}.................[.................3.................!......................./.............................v.......................w.................&.................H.....k...........x.................R...................................S.....m.............................L.............................m.......................P.....u.................L.......................X.......................^.......................S.....|.................J.....x.................p.................&.....~.......................b.......................G.....i.....{...........h.................9.......................? ..... ..... ..... ....T!.....!.....!.....!....b".....".....#.....#.....#....+$....u$.....$.....%....f%.....%.....%.....%....A&....^&....l&.....&....6'....e'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):525362
                                                                                                                                                                                                Entropy (8bit):5.366124885898627
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:TZpCbai+lbWusvbgQ5Pax5ttonxEGp7KY8OTy:3Cmi+lbWusB5Pax5tenxEGp7KYH2
                                                                                                                                                                                                MD5:6E38F51EBC9B4AF616C984ACFEF7323E
                                                                                                                                                                                                SHA1:1D871E09B051CDF1429FBB68FC43B7631DAD9438
                                                                                                                                                                                                SHA-256:E3ED1D14209965FACA5AC6A2B4026A4A28D21F5096E0C44943E731279190D540
                                                                                                                                                                                                SHA-512:4124F5ED6E9AC7701837AAE5458DB96DF8303FFF05ECBAB40D938CF0FDE3C5F2F696D07F0BE2227040A14336D2701F8A76342550419630F51C073070DC705492
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................U.................4.................@.....T...........;.......................c.......................[.......................?.....g.....u...........M.......................}.................4.......................=......................._.................(.................g.......................C.....W.......................$.....y.......................h.......................j.......................O.......................,.............................v.................,.......................N.......................?.......................".....x.................&.......................B.......................$.......................C.......................z ..... ....P!....a!.....!....O"....."....."....##.....#.....#.....#.....$....j$.....$.....$.....%....`%.....%
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):587942
                                                                                                                                                                                                Entropy (8bit):5.759897632158159
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:l2o5czDWoOB/kbwvGfQfR6HAEbFVP+CUdCe3mUUFMAmW1Qh4Mh5vJ14scsy:woGYabMe1Qhz5cR
                                                                                                                                                                                                MD5:2D6468A89698A05B8522F679825572D3
                                                                                                                                                                                                SHA1:52EC81BC896051ED8A865B44C58F82EABA6B89B9
                                                                                                                                                                                                SHA-256:477E505459C80A8477FA6EF1B8A0FAF16C5E450B69CF922C37BBE020A088E695
                                                                                                                                                                                                SHA-512:59A95F05D071C739D4DC1456B856D0283AD3D99AC35EC300EC38E76AB236BA6D6E83598D0823D46C07D62EE0457F2958C682F4EFA3EADB824A254F48387EC538
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:......../&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.#...v.8...w.E...y.K...z.Z...|.`...}.r.....z...............................................................................................(.......................{.................Z...........$.....B.................F.....\.................=.....Q.................P.....b...........9.....o...................................h.......................~.................&...........#.....n...................................w.......................7.............................I.....j.....x...........A.....z.................I.....|.................C.....t................./.....[.....k...........'.....[.....l...........V.......................U.....r.................2.....S.....y...........(.....i.....~...........P.................#.....i.................. ....Q ....w ..... .....!....p!.....!.....!....R".....".....#....,#.....#...."$....e$.....$.....$....J%....w%.....%.....%.....&....7&....F&.....&.....'....\'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):551569
                                                                                                                                                                                                Entropy (8bit):5.417670979179483
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:fl4UKe4ouC2NBXBL1WkoyVH5gcJBM90sRaY5K/:WzeRf+5TJ/sR15G
                                                                                                                                                                                                MD5:FBD585195E35E49C60A9190FBF815E86
                                                                                                                                                                                                SHA1:F88FE564784D0441A304A4B126DE27FB2B0412EE
                                                                                                                                                                                                SHA-256:ED647E78BC3E89A6322A7198DD1875034AC3CDA355BA6837EA0D4686D56712CD
                                                                                                                                                                                                SHA-512:22596E824D2226C8E0773F323FDDCB1A0C7523EE2077C38205EDB5B11EF15DE3C5768B8C598A781BDC49BE91C3B1B22BA92C3DA5E0BE6ACB5DF42670487E68E0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s."...t.+...v.@...w.M...y.S...z.b...|.h...}.z.....................................................................................................).......................m.................I...........5.....R.................Q.....f.................6.....F.................%.....>...........2.....x...................................x...........$.....5.................:.....N...........<.................4.................$.....s.......................S.......................Q.......................T.......................W.......................9.............................g.......................\.................).......................^.......................-.....y.................P.....{...........$.................$.....p.................. ....T ....{ ..... .....!....^!.....!.....!....H".....".....#....2#.....#....3$....}$.....$.....%....Z%.....%.....%.....%....2&....X&....m&.....&....E'.....'.....'.....(
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):555353
                                                                                                                                                                                                Entropy (8bit):5.392038775374042
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:B2lInvsb1Nq9rX7YZieJVJJxhQ3shYfVh85IKlbSRDF:EAvsb3qdXj85IK1SRB
                                                                                                                                                                                                MD5:C64146716C2A401FEC538E4C79785144
                                                                                                                                                                                                SHA1:3C5D0B45225A39A65C0345E5C98A4E539D807FE1
                                                                                                                                                                                                SHA-256:904189CAAEF1E278EE31432F8995BFC150975250FA355683E1CEF1B5C79D3BF3
                                                                                                                                                                                                SHA-512:CE8336F4C83E47779169B3F875D8910F7C30CF7BCA2CF77C398C37E32FDC8C01A43B5EF74CFD03C3ABE8E3979454EBB1396CEA7449640025423D2B1F565A5C0C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........I&..e.....h.....i.....j.....k.....l.....n.....o. ...p.-...q.3...r.?...s.P...t.Y...v.n...w.{...y.....z.....|.....}.....................................................................................".....4...........H.................&.......................u...........U.....p...........[.......................f.......................G.....t.................t.................Z.................2.................K.....X.................W.....g...........9.........................................e.......................P.......................H.......................X.......................`.......................K.......................$.....z.......................h.........................................H....................... .....`.....z.................O.....|.................o.................>........................ ....o ..... ..... ....*!....{!.....!.....!....i"....."....D#....\#.....#....L$.....$.....$....1%.....%.....%.....%....@&.....&.....&.....&....3'.....'.....'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):574388
                                                                                                                                                                                                Entropy (8bit):5.451836104471441
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:NTIexSy0/AfWKXEjvyJe/FoMxOINkjK0yGZq5BZyo2cs2V/qE53:NTIeTOKXEuJUFoyO/u0zq5BAor/d3
                                                                                                                                                                                                MD5:C613CAB2C2D6AC5B88E21FCB65671F19
                                                                                                                                                                                                SHA1:291D545427FEAF8DA9DD75679ADA1BB70C66EB47
                                                                                                                                                                                                SHA-256:8EDD01CC74EB965CFA4CB35249097D114F554B8D80883D7C7E335A857F33A810
                                                                                                                                                                                                SHA-512:1E826936C1636F7D5DA9870DD362984E2DEDB8F3BFFE3F64D8615BC955F4A1C2E988E7FB60387743949C200DF073FBB7B27DC3B6A66BA9D7950571CA2DD2FE57
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.!...v.6...w.C...y.I...z.X...|.^...}.p.....x.....}...................................................................................{...........Y.....s...........4.....m...................................y...........$.....C.......................%.....|...................................".....S...........A.........................................P.......................g.................#...........3.......................U.....s.................&.....K....._.................$.....4.......................4.......................+.............................Y.......................8.......................S.................5.............................W.......................V.......................q.................\.......................$............ ....; ....V ..... .....!....Z!....o!.....!....l"....."....."....a#.....#.....$....7$.....$.....%....F%....^%.....%.....%.... &....6&.....&.....'....s'
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):941599
                                                                                                                                                                                                Entropy (8bit):4.851052751447414
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:tqeL4fQjRo4Y+5NMx/K69zJ9ZFdAal2a4qSGsN9z/0TYH8eXN2hVO3j/tSbzvMBS:tKgk5b6tS
                                                                                                                                                                                                MD5:36D9CBBB31930EB5B78378EC63751BE6
                                                                                                                                                                                                SHA1:5D123C38941CC4E59570254909291B29970F0CE1
                                                                                                                                                                                                SHA-256:DE90BA6507DC032C853FC61BDBF9218A29FF70379B571B1F4F3D7A28C3902479
                                                                                                                                                                                                SHA-512:EACCC7FBDF3E9D9C9EB1A602C1BF17C8BAFC920EBD058C4D2C496B95BB1B3FABCDFC87D1747BFD8CD404DE75C887038A99717BE7960BC808B632039EC9F80A06
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%..e.H...h.L...i.]...j.i...k.x...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}....... .....%.....-.....5.....=.....D.....K.....R.....S.....T.....V.....s.............................P.......................2.......................c.......................!.....f...........O...........W.....z...........,.....p...........;...........-.....i.....\.............................,.....~...........Z...........;.....`.................B.....o.....s.....m...........<...........O.....|...........=.......................~.................9...........>.....w...........B............ ....A ..... ....D!.....!.....!....."....."....."....."....a#.....#.....$.... $....2%.....%....~&.....&....3'.....'.....'.....'....s(.....(.....(.....).....)....+*.....*.....*.....+....M,.....,.....-.....-.....-....%.....7...........f/...../...../.....0.....1.....1.....1.....2....A3.....3.....3.....4.....5....:6.....6....87.....7.....7.....8.....8.....9....E9....^9....6:.....:....S;
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):592404
                                                                                                                                                                                                Entropy (8bit):5.807054231111397
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:phWgwEC/qsIkBr7iIip+RC5y+dbLxrQzLPxt9eH:zWR/qsx7iCC5NLaBtEH
                                                                                                                                                                                                MD5:59822645439846B0A211C8566E7CF90E
                                                                                                                                                                                                SHA1:F4EDAE1B34DF718FD72EBEBD6DC9E36CFEF95584
                                                                                                                                                                                                SHA-256:60319C30E94770472017E83ED0309A8F134F0D60E38261F53517EA23E9658C09
                                                                                                                                                                                                SHA-512:E2A7295BBFD5E721C765F90FAE0AD1420902A916E837E1B0BD564BB9EB553908EADEA58739F21D75C9F38CD3D1E821DCF14545884462FAA3F70617AFC764B84A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........2&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.%...t.....v.C...w.P...y.V...z.e...|.k...}.}.....................................................................................................S.................W.............................&.....u.................`......................................... .....z.................6...................................Q.....t...........k.................1.......................u.........../.....F...........k.................9.....................................................|.........................................S.......................h.......................y...........'.....:.................F.....Y...........s.................(.....v.......................Z.....v.................U.................- ..... ..... .....!....o!.....!.....!.....!....s".....".....".....#.....#.....#....@$....Z$.....$.....%.....%.....&.....&.....&....8'....Y'.....'....*(....Y(....m(.....(.....)....>)....R).....)....I*.....*
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):568760
                                                                                                                                                                                                Entropy (8bit):5.4785168337779435
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:1Hr7a+NC5qB2r+JpEE5U8c2JHvbxi/fz8lqc:1L+UC5fyEE5U8cAi/fz87
                                                                                                                                                                                                MD5:970F310ACBAFA4A29E0CFA5C979DF397
                                                                                                                                                                                                SHA1:B1C20EEFC61785C3CBAF7D6D3B5FD2B144CC1EF5
                                                                                                                                                                                                SHA-256:B4EFD0CE0957A00E2E617A3E595B471ADFDFBDEE333C14BA41B8DC8BB5653324
                                                                                                                                                                                                SHA-512:D1DF03814C42819F94A7CF3FA54D699AC8A844C69303CEAED97BA3D3512406161F011120395904B473EACA29D8959B9A14C85D90A880508611E80A46B9D97575
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&3.e.z...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.!...z.0...|.6...}.H.....P.....U.....].....e.....m.....t.....{.....................................................[...........=.....V...........,.....].....n...........z.................N.......................S.......................E.......................W...................................B.....c...........A.....{.................e.................1...................................l.................A.....X.....p...........".....E.....U.................:.....M...........0.....l.................G.....z.................q.................&.......................'.......................6.......................Z.......................B.......................9.......................`.................3.................. ..... ..... ..... .... !....4!.....!....."....D"....\".....#.....#.....$....1$.....$....f%.....%.....%....e&.....&.....&.....'....a'.....'.....'.....'....S(.....(.....(
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):872667
                                                                                                                                                                                                Entropy (8bit):4.788135484665425
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:i5s/IU2p79qWYZAYI8dlSDdrPuzQhrUPb7FW5fZPT0xT7xH47L37SjeUM/k/3:IsZhYIlW5exxB
                                                                                                                                                                                                MD5:5E439D9D281D90569CD4AA231FC8B287
                                                                                                                                                                                                SHA1:AA8D4E28770F430DD7F93E2B9879748A97C74FB0
                                                                                                                                                                                                SHA-256:9082215832960416F3E6B43D2F76869A8632506BFE3A806A1B46C858B1370806
                                                                                                                                                                                                SHA-512:C9491A35C082B1BB7C08B732D6F07DBFFA5BB955988141D3C56D3F482D9FA74763EB196AA7F37445808163AB790A0B23091C06F81EBACB94BD164DC72B01A71C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........<&..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}.....................................................................................>.....s.....`.............................:.............................#.....W.................H.....}.....$.............................!.....h...........Q...........@.....{.....{.....9.......................a.......................A.......................e.................$.......................j.................3...........8.....r...........! ..... ..... ..... .....!....J"....."....."....}#.....$....R$....s$.....%.....%.....%.....%.....&.....'....Q'....r'.....(.....(.....(.....).....).....*.....+....3+.....+....9,....q,.....,....8-.....-.....-................Z/...../...../.....0....#1.....1.....1....z2.....2.....3....L3.....4.....4.....4.....5.....5....{6.....6....-7.....8.....8.....9.....9.....:....5;.....;.....;.....<....4=.....=.....=....2>.....>.....>.....>.....?....q@.....@
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):512705
                                                                                                                                                                                                Entropy (8bit):5.538975019723545
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:UoQDiRIZXEr1COYNcNUAvSrZxkmvZl1HI4RFcz9RyoxGOGW3IiRMaSOmDE/xWcqX:DQDRZXllNcGrjr5O57ze
                                                                                                                                                                                                MD5:D31FED9E04F8915045F6A2CC7BD4C9FE
                                                                                                                                                                                                SHA1:8C68186DC5463D4E45889E8DE021536110B09453
                                                                                                                                                                                                SHA-256:931598B71AD77874A64294614BA73B426A717F343674FCEB7BAEE227D4413B9D
                                                                                                                                                                                                SHA-512:3C9D2F8F655006722AC5B08E8575EDAC9CCE21061B3A8696B8E772734A12BBFE04C53838DEC475887DBC82501E90A8799ACE71DC49BA05CF766037D001852493
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%V.e.4...h.8...i.I...j.U...k.d...l.o...n.w...o.|...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................!.....).....0.....7.....>.....?.....@.....B.....S.....e.....y...................................Y...................................b.....{...........K.......................V.......................U.......................z.................L.................$.........................................8.....H...........D.................@.................M.......................".....z.......................W.......................K.......................X.......................M.......................=.......................4.......................?.......................T.......................-.....}.......................N.....o.................Y.................$.....z.......................k.................. ....a ..... ..... ....,!.....!....."...."".....".....#....I#....o#.....#....;$....k$....~$.....$.....%....6%....D%.....%.....&....1&
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):539452
                                                                                                                                                                                                Entropy (8bit):5.338235032300934
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:pGnHmfiscrB5G7CCRdCAUQbQW4243xaKFNUq89F1ggt45JUAcwg6yJMkJPe/Bmqa:pSoo5GH
                                                                                                                                                                                                MD5:F0314E8F5AF94C845AB4218468AF3454
                                                                                                                                                                                                SHA1:4ABFA3D5D114AE89CB449F83C1267DA3DB0EF8BE
                                                                                                                                                                                                SHA-256:0CE0651A673A250FA86E6A9DF4EC490C832F045E07617343F015599687AA84E8
                                                                                                                                                                                                SHA-512:11E6CA00ACD7D65495F7C04BA5E558DAAD835C48BD230F616DE62954B9E10FC45E816E049E1ADB858B29D335DA08808B560F04C8A6AED83B62ED722F1968C08F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........)&$.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.(...w.5...y.;...z.J...|.P...}.b.....j.....o.....w.............................................................................u...........D.....Z...........).....h.....z...........m.................2.......................$.....w.......................\.......................f.................H.................,.................8.....H.......................<.................=.....Q...........`.................3.............................Q.....t.....}.................=.....I...........,.....w.................6.....j.....|...........@.....}.................0....._.....l...........&....._.....h...........L.......................^.......................h.................*.....z.................F.......................x.......................S.......................a ..... .....!....#!.....!....."....u".....".....#....k#.....#.....#....T$.....$.....%.....%.....%.....%.....&....,&.....&.....'....['
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1387366
                                                                                                                                                                                                Entropy (8bit):4.061553280377292
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:cyu/keC6jicF5ZzVtR6cA25tm1vYpiMyg:Yj9F5ZzUcA25tm1vYpiMyg
                                                                                                                                                                                                MD5:4411E4698E279FB95ADEA7BE9625F800
                                                                                                                                                                                                SHA1:A3C655D334442CF5EF106B92F9778C9B3FBC252A
                                                                                                                                                                                                SHA-256:BEABEEA92C3FB9C52C22BADD99D686F1690E3574C75CD7A886320FB2CAC53D92
                                                                                                                                                                                                SHA-512:4406ADF5F7BEB86A49695FFF0A3E92E108AC2EE4DAAE46821C74164018FBD72E6D1DDA7C3B689B30A1F19C17B13B0C1BF0537C966ABE88137A0135D04483BF41
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........&7.e.r...h.v...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.*...|.0...}.B.....J.....O.....W....._.....g.....n.....u.....|.....}.....~.........................................{.....A.....j.............................n.......................5.....k...........9.....:.....-................................... .....X.....\...........G.......................#.....D.....Z ..... ....@!.....".....#....L$....}$.....%....&'.....'....U(.....).....+.....,....^,....a-....*.....~............/.....0.....0....-1.....2.....2....K3.....3.....4.....5....F6.....6.....7....z8.....8....-9.....:.....;....y;.....;.....<.....=.....>....<>....6?....'@.....@.....@..../B.....C....\D.....D.....E.....F.....F....4G.....H.....H....;I.....I....aJ....JK.....L....bL.....M.....N.....O.....O....yP....?Q.....Q.....Q.....S.....T.....T.....T....qV.....W....eX.....X.....Z.....\.....^....8^....._.....`....Va.....a....6c....\d.....e....me....qf....^g.....g.....h....Pi.....j.....k
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1281329
                                                                                                                                                                                                Entropy (8bit):4.31693967998977
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:lGfZBWX7McKNsC1ot59d4e/gb0HrWs05Bk3p1FZNViFlJ2wtg+NFqhrOlHXAAFwG:cxBWVZd57MkC
                                                                                                                                                                                                MD5:443D47F30632512C7E5A6E142D2A3CA3
                                                                                                                                                                                                SHA1:98730D4194266544C204E11E30C1817A5C8DFAE6
                                                                                                                                                                                                SHA-256:12267195833FF2F15F99947478C75EEB18923EB125AAF7118A0F398045636E33
                                                                                                                                                                                                SHA-512:34A02D50B300E8283A896BA492277FB6D2C16BFEEF88B30344C803D060DC50FA638BECA10F5113EBFE23D6E5882D82D072303112008FA721FF20EA087385C71C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........I&..e.....h.....i.....j.....k.....l.....n.$...o.)...p.6...q.<...r.H...s.Y...t.b...v.w...w.....y.....z.....|.....}.........................................................................).....].........................................a.....S...........<.............................>.....W...........1.......................D.....S.....#.............................7.................D...........p.................0 ....q .....!....."....4#....w#.....$.....&.....'....I'.....(..../*.....+....i+....T,.....-....Y-.....-..........|/...../....(0....<1.....2....l2.....2.....3.....4....x5.....5.....7.....7....Z8.....8.....9.....:.....;....J;....i<....9=.....=.....=.....?.....?....d@.....@.....B.....B.....C.....C.....D.....E.....E....+F.....F.....G.....G.....G.....H....rI....3J....kJ.....K.....L....RM.....M.....N.....O.....O....LP.....Q....jR.....R....;S.....T....>U.....U....!V.....W.....Y.....Z.....Z....v\.....]....:^.....^.....`.....`.....a.....a.....b.....c.....d....Kd.....e.....f....Ng
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1076392
                                                                                                                                                                                                Entropy (8bit):4.3678914271676845
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:lk8N9LyZYAST4z1L/L1XPVLsbhRy1cW+v1H5UJEyL3ftj8wlz9eTRo98GkK9uLAR:lip5h5F
                                                                                                                                                                                                MD5:ABFAD720A09628E229EE75C14DCC1DEE
                                                                                                                                                                                                SHA1:80A075F9714D4C3BAFF06E1935B304558C3D597E
                                                                                                                                                                                                SHA-256:0C8332F2C81038A69282A049FD59EC76F2370F329F9AEFF9A54AE1B0AB83AFB1
                                                                                                                                                                                                SHA-512:D43A39699ED5F0E55A4491B726B44CF6238C9FB69C919F5DBFFBF6627221C524737115AC4FF604A1B6208AF7CAD52192CE896A6C57EEBE3A9BB721F9EC57ADBD
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........Y%..e.....h.....i.....j.....k.....l.$...o.,...p.9...q.?...r.K...s.\...t.e...v.z...w.....y.....z.....|.....}...............................................................................).....S.............................................................................6.....u.................+.....|...................................(.....p.................g...........P.....G...........X...........w..... .......................4.......................B...............................................q............ ..... ....|!.....!....."....."....f#.....#.....#.....$....n%.....%.....&.....&.....'.....(....&(.....(.....).....*....:*.....*.....+.....+.....+.....,.....-.....-..........4/....10.....0.....1.....1....\2.....2.....2.....3.....4....a4.....4....65.....5.....6....M6....m7...."8.....8....(9.....9....=:....t:.....:....y;.....<....b<.....<.....=.....>.....>.....>.....?.....@....jA.....A.....B.....C.....D.....D.....E.....F.....G....FG.....G.....H.....H.....I.....J.....J....pK
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):550618
                                                                                                                                                                                                Entropy (8bit):5.609493488679069
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:cHODNEWFOVqzdRdiZmqDhz0yqxv8CcHuki4wge75HX/2+1i1nEedGAMYw/KOe67:4OyqFCmG4zkiN5HX//
                                                                                                                                                                                                MD5:CE85F55613C69479E13D011F0B81E3F1
                                                                                                                                                                                                SHA1:07C31DF75DEECEC1BC09FFCD473B885EF0467B42
                                                                                                                                                                                                SHA-256:EEA13AECCB9DC35CF6E5135BCAB2F376D584CDEFC4B2970ED1126F8C2043AFCC
                                                                                                                                                                                                SHA-512:3A6C6015003A09295AB4CA7BBBC421F281E3A8719C56EF9D0BB4448413656778DA7C70D7F67FCBED7051E562027CBD7BCEA84596E48AADA64193AF448002120C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........Y&..e.....h.....i.....j.....k.&...l.1...n.9...o.>...p.K...q.Q...r.]...s.n...t.w...v.....w.....y.....z.....|.....}...............................................................................2.....G.....a.............................c...................................X.....s...........4.....o.................+.....R.....a.................D.....V...........&.....X.....z...........m.................2.......................1.......................>...................................A.....Y.................C....._.................M.....^.................H.....X...........#.....Z.....g...........6.....m.....~...........?.....q.....~...........:.....j.....v...........;.....o.....|.............................S.......................T.......................4.......................G.......................e.......................L ..... ..... ..... ....d!.....!.....!....."....."....b#.....#.....#....z$.....$....6%....Z%.....%....`&.....&.....&....)'.....'.....'.....'....@(.....(.....(
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):938457
                                                                                                                                                                                                Entropy (8bit):4.888192308730272
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:iqzRMYWYPnfzKj0meRi8ICN5ZB3IjMAlLEXdcuKLNiXEqqbQuKz+4uL2uoj:/uSz58E3
                                                                                                                                                                                                MD5:E72DBF8C00F7C211D1A220DB30EC7A7E
                                                                                                                                                                                                SHA1:8F891C83E0FBAA78A8267CF5B54462BD64DE9C6F
                                                                                                                                                                                                SHA-256:B1892427972D0454F8B85AF85DCC074393FFBCB2381EA91EFB2E85EB03FF2A04
                                                                                                                                                                                                SHA-512:D1F3E5DBC50B14FEADFC30999C89DB1A0431E4758EE82CF18DA81F991CDF76C3298FD98D3CB3E2AB902A11C8A7E11C6D7645E1ED91ED5F3280A4420C1FB793D0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%q.e.....h.....i.....j.....k.....l.9...n.A...o.F...p.S...q.Y...r.e...s.v...t.....v.....w.....y.....z.....|.....}.........................................................................,.....E.....o.................X.......................Q......................._.......................z...........)...........L.................j...........V.....k.....'.................L.....9...........{...........i...........c...........1...........%.....F.................$.....Q.....@.......................T.................#...........,.....l.........................................8 ..... ..... ....V!.....!....0"....K"....."....\#.....#.....#....N$.....$.....%....3%.....%....F&.....&.....&.....'....t(.....)....?).....)....Q*.....*.....*....*+.....+.....+.....+.....,..../-.....-.....-..........l/...../....[0.....0....\1.....1.....1....d2.....2....(3....U3....,4.....4....25....^5....P6....$7.....7.....7.....8.....9.....:....Y:.....;.....;.....;.....<.....<.....=....U=....r=....F>.....>....b?
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):817673
                                                                                                                                                                                                Entropy (8bit):5.177156515939135
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:C7a3H/NvV+8PomRMD2nyBO3QU5ANJhEFZWPOEojYzQYrNwadcJKwU8ueco/9Njjk:Vvvt5LWp
                                                                                                                                                                                                MD5:3129155651C81F86E5E2794B0CD15EC7
                                                                                                                                                                                                SHA1:FB3D6C2156E1230C099B02171F3E9100FBE542A8
                                                                                                                                                                                                SHA-256:67B353376ECC45F0271CB2526B96AEB681F717968C35397F7E53AA43D3D31D08
                                                                                                                                                                                                SHA-512:31831DEAD97B53E600317091DC08807D1D040A1FC27753CCEB4104A865583C79E1EC68FE6AB644819EF49F262981ADB6EF38D67CB53CB3FDDD43271780FEFCEB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........-& .e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.-...w.:...y.@...z.O...|.U...}.g.....o.....t.....|.........................................................................................;.....b.......................R.....1...........m...........U...........\...............................................Z.....}...................................\.......................6.................W...........S.....p.....C...........}.................N.............................,.....T...........?.....|...............................................S.....q...... ..... ..... .....!.....!....."....Y"....u"....."....q#.....#.....#....\$.....$....*%....F%.....&.....&....3'....^'.....'....n(.....(.....(....d).....).....).... *.....*....'+....m+.....+....U,.....,....Q-.....-............................./....&0....x0.....0....p1.....1....j2.....2....k3.....4.....4.....4.....5....W6.....6.....7.....7....w8.....8.....9.....9.....:....]:.....:..../;.....;.....<
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):651358
                                                                                                                                                                                                Entropy (8bit):5.790776889845594
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:BhaQjDW+cuwJ/roEKaaFoGnXy0bxcPdH9+vUx5WY8hZq94KibJziMHo6wtk1e:B0d+cuwJ/7a3ni0be35N8vq1ibliMI6U
                                                                                                                                                                                                MD5:5910DEDFBC84629690DD59478E80B51A
                                                                                                                                                                                                SHA1:AF6E9281C779E40ACF1A8A1EABB1AA926AB85F85
                                                                                                                                                                                                SHA-256:0832B96542456367261A215719ACDCC394A027C04A4F0C313F9401D6B222F756
                                                                                                                                                                                                SHA-512:1BD32EFA3D034442D85D2478EFA8180E11126E80F03097B813CCFD4521039E186342CC9EFAA47809DB9852ADA3541B76E668D43C7A427D2410DAB6C0A1BA1B2C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%q.e.....h.....i.....j.(...k.7...l.B...n.J...o.O...p.\...q.b...r.n...s.....t.....v.....w.....y.....z.....|.....}.........................................................................&.....7.....`...........7...........U.....q...................................*.................?.................%.....z.......................o.................!...........@.................}..... .................I...........&.....8...........7.................?...........$.....L.......................,.................'.....F...........&.....P.....a...........A.....}...................................V.......................k......................................... .................C.....U.................. ....% ..... .....!....O!....n!.....!....C"....m"....."....d#.....#.....#....c$.....$...._%.....%....)&.....&.....&.....&....w'.....'....!(....D(.....(....>).....).....)....]*.....+....s+.....+....L,.....,....J-.....-..........m.................&/...../...../...../....s0.....1....[1....|1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):472125
                                                                                                                                                                                                Entropy (8bit):6.686635546459109
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:y3OYfu048lFDezkK7/56jOIydpD65imqjNnEwYHB074lK:y3hfu0HjyzX56jOIyz65rcNnEwmBK
                                                                                                                                                                                                MD5:79D8DDFE89B3B2B37BBBF85AFD6E6D67
                                                                                                                                                                                                SHA1:0D0316D3D1DA0D13D2C568F0FAB9116996998C7C
                                                                                                                                                                                                SHA-256:ABBF9199B7751AD09750361E2EE861876EE44D65020B7D1255C45DFF911BCF89
                                                                                                                                                                                                SHA-512:5F6B736B835DF71BA67906710BF86CDEB37542642CC03FFE6CC73557C2BE35CE99C5838739B160D26545D7A55E4263DEE7E55E942307F7D8657E3E8FAFDE5114
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%..e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s.....t.....v.....w. ...|.&...}.8.....@.....H.....S.....[.....j.....o.....w.....~...............................................B.......................s.......................q.......................|.................2.............................X.......................7.......................7.......................S.......................D.......................*.......................1.......................4.....w.......................>.....d.....p.................#.....2.................:.....L.......................&.............................d.......................<.......................?.......................P.......................'.....u.......................h.......................K.............................H.....T.................6.....H.................?....._...........H.......................n.......................k.......................3 ....Q ....a ..... .....!....A!....S!.....!
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):469061
                                                                                                                                                                                                Entropy (8bit):6.698957808032297
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6144:bSSfomw9A7NuQRFcjArmJflGj2DuUasg5b57jkzrMOZQyZV7zeHk2Tt:bSSf5wG7NuFjA0xasg5b57jkzbr/7m1
                                                                                                                                                                                                MD5:687995F645CB9169DBFC3431E8FCFE3B
                                                                                                                                                                                                SHA1:D6931394363D7C479791B32C8AD268786FFCE8AF
                                                                                                                                                                                                SHA-256:35A0323EB90FA53859961F832BCB66C391F53E6449722F6FDC136D92484C47C9
                                                                                                                                                                                                SHA-512:FAAAD1CE95650FA67AA7E86F2453DEDC70C6E206BB15DBA4E824BB0D540D884A09A75A48A9E36FEEB83B75232258B7431B1F3DF53A824FA322B3C4E87BEABA14
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........%..e.Z...h.^...i.o...j.s...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......%.....*.....2.....:.....A.....H.....O.....Q.....V....._.....k.....z.................y.......................q.......................f.......................Z.......................A.....j.....v.................3.....@.......................0.......................1.............................r.......................a.......................w.................1.....}......................./.....{.......................F.....i.....x........... .....I.....U.................&.....2.......................!.....s.......................K.......................<.......................2.....x.......................>.....X.................<.....N.................,.....O.............................P.......................;.......................D.........................................0.............................[.............................h.................. ....Z
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:CSV text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1051021
                                                                                                                                                                                                Entropy (8bit):5.4211132061857965
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:SDb4GbP8IrxcFMOCGHo2QZIZ40P7usnnR6yTgkXb2X:dTgkXO
                                                                                                                                                                                                MD5:82D7AB0FF6C34DB264FD6778818F42B1
                                                                                                                                                                                                SHA1:EB508BD01721BA67F7DAAD55BA8E7ACDB0A096EB
                                                                                                                                                                                                SHA-256:E84331E84CD61D8BDACC574D5186FB259C00467513AA3F2090406330F68A45DB
                                                                                                                                                                                                SHA-512:176458B03CC2B2D3711965CD277531E002AE55D284B6C9178D2353E268F882430235468E5A1E9E45C8427864D109CF30A024A993B4763A75FA2744F6E0A6AE2A
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:IDS_ACCESS_CODE_CAST_ACCESS_CODE_MESSAGE,1400,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_BACK,1401,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CAST,1402,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_CONNECT,1403,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_DIALOG_TITLE,1404,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ENTER_CHARACTER,1405,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_ACCESS_CODE,1406,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_DIFFERENT_NETWORK,1407,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_NETWORK,1408,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_PERMISSION,1409,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_ERROR_TOO_MANY_REQUESTS,1410,../../chrome/app\access_code_cast_strings.grdp..IDS_ACCESS_CODE_CAST_E
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):18401792
                                                                                                                                                                                                Entropy (8bit):6.484724602010289
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:196608:UFhL+fUAW3m8p73KQ/ZxCSIK7Z5JG1xC/e:UFp+fUAW3m8pDKQ/ZxChK7Z5cjC
                                                                                                                                                                                                MD5:6A067CB26AF2C240C240BC81C4A4F311
                                                                                                                                                                                                SHA1:CFB1A89616DC14830EB073F4CD84AC4EB14B4534
                                                                                                                                                                                                SHA-256:C1E6EF50932D0CD9EDF8FF4C663CFCCA358F2E2D5349B3B7904E4D4D8F6D8882
                                                                                                                                                                                                SHA-512:25520B39C834BAAC056958C22EBA1B2317B0D7967F351C66BA6177FB9FFC3FD4B6C0E8489CFBD8B2E477854F75163856F23775BAE6B8A0721048FD961E276BAD
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...Bx.e.........." ................L.........................................B...........`..............................................#...2..,.... A.......;..n...........0A.\t..|...........................(.......8............P...............................text............................... ..`.rdata....... ......................@..@.data...@9*..@......................@....pdata...n....;..p..................@..@.gxfg.........?......V..............@..@.retplne......@......F...................tls....a.....@......H..............@....voltbl.......A......J.................._RDATA........A......L..............@..@.rsrc........ A......N..............@..@.reloc..\t...0A..v...T..............@..B................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1162240
                                                                                                                                                                                                Entropy (8bit):6.551791881008996
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:ouraOSnSamNJMd26Fpz2vWISMtjK+N4cpfATBp5j2Iv8oia7gPhI+nkMoe8r8WJW:ouWJSap2spQ9tXATBT6IQa7S18oW4
                                                                                                                                                                                                MD5:EDF83410995BEA188731EF377334ED7B
                                                                                                                                                                                                SHA1:B12C8925409701725749A9EBCC9D6CBFDB0122DD
                                                                                                                                                                                                SHA-256:B464548564A8B97682560630127AA447D25FE692F887A4822A36B2EF8F250E97
                                                                                                                                                                                                SHA-512:A14B61223B0D2E1A7389934559EEC5279A1C2B0C713B0FDAA08F4F979A3B37D8BADED355B42AEF5FEA13A254AF177F5EB152C6C009985F3294C5097035907EE2
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........."............................@..........................................`.............................................\...t........p.......P..................................................(...0...8...........0................................text...F........................... ..`.rdata..............................@..@.data...........@..................@....pdata.......P......................@..@.gxfg....,...........`..............@..@.retplne.................................tls......... ......................@....voltbl.F....0..........................CPADinfo8....@......................@..._RDATA.......P......................@..@malloc_h0....`...................... ..`.rsrc........p......................@..@.reloc..............................@..B................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):196713984
                                                                                                                                                                                                Entropy (8bit):6.709853681888895
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:1572864:T671igPCQDu9VieLAbOP1nmnq/lbL7IKJciUtkMHs5sx1qqV88:eJiDS610scieJq1
                                                                                                                                                                                                MD5:0B9A2D445F28B403D525380817A2636E
                                                                                                                                                                                                SHA1:E4BECC1533A42871BA87A06D039D3477ABE4F79A
                                                                                                                                                                                                SHA-256:264773127DEA00204A3A52BAE4A4510D610292FDD759B7EAF40BD1B59AD88C6B
                                                                                                                                                                                                SHA-512:45BF3DC8C1B118AE26B6A4436591D1B15B339BC6BD8E69E112F0F6ADDB834B0CFD8958AC63BFC712C4A7D9C365FC6944AB80F0D61765170ADF67B5535DEE12E1
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .........`...... S....................................................`A........................................G.-..!..../.|.......p.....R..B^..............T...i .8................... b .(...@..8............./......U-.`....................text..."........................... ..`.rdata..X.... ......................@..@.data... .... 4.......4.............@....pdata...B^...R..D^...>.............@..@.gxfg...0C.......D...@..............@..@.retplne.....`...........................rodata......p...................... ..`.tls....A...........................@....voltbl.v...............................CPADinfo8...........................@...LZMADEC............................. ..`_RDATA.............................@..@malloc_h0.......................... ..`.rsrc...p...........................@..@.reloc...T.......V...H..............@..B................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):685745
                                                                                                                                                                                                Entropy (8bit):7.962986984739525
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:9B46F4C8DFC0A55BFAFAC55F17D7659B
                                                                                                                                                                                                SHA1:D25F27DF176AADB67BC56A42262BCCAFD14AF4F4
                                                                                                                                                                                                SHA-256:B637AE345B830649B4027F39F6EE48F92484A2ACB65DE498E4FDD84EC1010336
                                                                                                                                                                                                SHA-512:DE5F500AFE381A16E3FF7DDCB5C8AA538362E55222F7915276BB4C9261E41CBC2403CA1663A7DBF0706D8D51ABC420E26804F67CFD646D7986130A20A659F345
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:..........O............... ...........@.........p?....q?h...r?...s?<...t?....u?....v?h...w?...x?&...y?....z?...{?9...|?....}?...~?N....?.....?.....?J....?.....?}....?.....?....?1....?O....?.....?.....?.....?.....?%....?.....?.....?.....?.....?.....?m....?5....?.....?.....?.....?0....?.....?.....?e....?.....?u....?.&...?>'...?.'...?.(...?G)...?.)...?.2...?.<...?.P...?.c...?Ce...?yf...?.h...?jk...?.n...?.w...?.....?D....?.....?.....?+....?z....?&....?.....?.....?(....?.....?.....?.....?.....?6....?4....?.....?.....?.....?@....?.....?.....?.!...?]*...?.2...?38...?.@...?.A...?._...?/y...?.....?`....?9....?.....?U....?.....?.$...?S7...?E`...?.t...?p....?.....?K....?&....?.....?.....?.....?A....?.....?.!...?.+...?.3...?u;...?.C...?.H...?rT...?.^...?.b...?[g...?yl...?.}...?.....?.....?k....?n....?"....@.....@.....@.....@f....@.*...@M@...@.Q...@.c...@kq...@W{...@Q....@X....@c....@.....@j....@O....@R....@S....@....&@g...'@Z...(@....)@....*@....+@....,@....-@V....@..../@D...0@.8..1@.9..2@.<
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1079219
                                                                                                                                                                                                Entropy (8bit):7.95049008504143
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:F666B710DA2BED9AC0252C1FA1D00C4A
                                                                                                                                                                                                SHA1:0D8288FDE82C2F3B7BD006FCF4CB92246AEFAF6D
                                                                                                                                                                                                SHA-256:F1AB589CFD40FB17A7C390B45FFAD8FCF90C133FFF1D14CA5BFC7053A21DC241
                                                                                                                                                                                                SHA-512:982BB5EA2C14170D47E150DC8692EBE316EC5D6B584377020C1F58AE0632748CB631182A6BFAD2F909EF6B818B012527367A36D8681B5B56DC735B8CCAF7B52F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:..........O.........+...........|.....#.........p?....q?@...r?....s?,...t?....u?....v?|...w?...x?R...y?...z?'...{?....|?....}?V...~?....?.....?.....?....?I....?.....?A....?.....?.....?.....?~....?d....?.%...?.C...?.Y...?vn...?Qp...?.p...?Br...?.y...?Rz...?.|...?.~...?U....?.....?X....?....?.....?.....?.....?.....?.....?X....?.....?.....?.....?g....?.....?*....?.....?.8...?.:...?z<...?.>...?.D...?OJ...?._...?.p...?o....?%....?.....?[....?....?.....?.....?.....?.....?.....?.+...?.>...?.M...?Ra...?4u...?.....?]....?.....?.....?.....?.....?. ...?^4...?.L...?.[...?.t...?.w...?.....?u....?.....?.....?.....?.....?.+...? >...?7Z...?.l...?.....?t....?:....?.....?-....?.....?.....?.....?.(...?_7...?.L...?.X...?.b...?]i...?.q...?.z...?i....?.....?;....?.....?.....?....?z....?.....?H'...?.S...?.t...?d....@.....@S....@\....@.....@.H...@.v...@M....@.....@.....@a....@.....@.....@oI...@6....@.....@,....@....@.....@:...&@....'@....(@0...)@....*@*...+@....,@....-@h(...@94../@v>..0@....1@....2@..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1134592
                                                                                                                                                                                                Entropy (8bit):6.555043286804751
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:364F839CA8DE4D942270D9097D48EF15
                                                                                                                                                                                                SHA1:82C8040DC2A733EB3EA3E051513C84F992BB17F1
                                                                                                                                                                                                SHA-256:A4E521C12FE47816F2D9E2DFED9FD074E370EC587D0A0F3A03B5AEBB76C06560
                                                                                                                                                                                                SHA-512:BAF1ED5E558DC0AE037FE0DFF036792CFBD338915C8AF99D10F0202B92CA820298657A86A0F3E8C1387326FDA34DE3EE08649C34AF2417159A24AED9CED02DF3
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .....V...........).......................................@............`A....................................................<.......8.................... ..<....~..8....................}..(...@...8............................................text...-T.......V.................. ..`.rdata.......p.......Z..............@..@.data...T....@...B...*..............@....pdata...............l..............@..@.crthunk.....p......................@..@.gxfg... ,..........................@..@.retplne.............$...................tls.................&..............@....voltbl.B............(..................CPADinfo8............*..............@..._RDATA...............,..............@..@malloc_h0........................... ..`.rsrc...8............0..............@..@.reloc..<.... .......8..............@..B........................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4656369
                                                                                                                                                                                                Entropy (8bit):7.995866504972196
                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:0F1D45867B591D67B0301EE8C4AD5F7B
                                                                                                                                                                                                SHA1:F5FB6378C13912DF079EFEE44476FC1B4666EF24
                                                                                                                                                                                                SHA-256:A2434429FEA5B3344426E388F9A2191E10449103E933EF7F0CDBF4638F22380D
                                                                                                                                                                                                SHA-512:1DB79C82E67547A76D3D479168EE12899E7E03D8C065239976E0A490804182290B76829E483E8F18F7FEAFE7E819D2784C507D7ABCDAB917B62D78696059EE80
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:............{.,0..|.,0.....3.....5....~...........8...........Ol..........p.................K........... .....I......!....."....d$.....%.....&.....'.....+....MW.....X....I_....Pj.....p.....u.....}....G................?....?.....?.....?R ...?J"..-?.%...?.4../?.D..0?.T..1?.c..2?Gs..3?...4?5...5?k...6?T...7?....8?....9?....:?V...;?....<?.*..=?:B..>?.^..??Su..@?....A?Y...B?)...C?....D?....E?....F?....G?a)..t@],..u@./..v@.2..w@!8..x@.;..y@.@...APT...A.V...A.]...A.l...A3m...A.m...A`n...A.n...A7o...A.o...AGt...A.|...A/....A6....AS....Ai....AF....Al....AG....A;....A.....A.....Ac....A;....AE....AY....A....A....A....A.....A.....AP....B.....B^....By....B.....B.....B.....B4....B....,B....-B.....B`....D.....D.....DM....D_....D3....D4....D.....D.!...D."..>I.%..?I.&..@I.+..AI....BIj/..CI.0..DI.4..EI67..RI.8..SI.:..TI.<..yI"H..zIiR..{I/^..|I&j..}I.t..~I.....I....I.....I.....I....I/....I'....I&....I4....I.....IN....I*....I.....I.....IS....I.....I.....I.....I.....I4....I.....I6....I.....IV"...I.0
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):686733
                                                                                                                                                                                                Entropy (8bit):5.111423885670035
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:E68978443DDAFD40434C87818C90D338
                                                                                                                                                                                                SHA1:C38FC19A469E6C9AF4699ABFE00C5FFE39501726
                                                                                                                                                                                                SHA-256:7AC9FB58F00E735E266730FEFC25D1B3C4B58EC789D5540F0424E746712CD9DC
                                                                                                                                                                                                SHA-512:D9A7998A70E63ED8375052329033E83EEBDB6F856FFDE3C1077A450F985E379D04778EB30AD29CDAAABD33F4ED4437F8C18C73153B58375A8CD8AB26D8A64D54
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.............@..12.2.281.16.........................................................-............%..............a........a........a........ar.......a........a............v...Bw....w...Bx....x...By....y...Bz....z...B{....{...B|....|..(Jb....L.....@..F^.-..1.`.....(Jb...2P.....@..F^..`.....L...IDa........Db............D`.....).D`.....D].%.D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L..............................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4483072
                                                                                                                                                                                                Entropy (8bit):6.30617269058202
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:DB64B157590C89B63D7E7FCF97FD7A01
                                                                                                                                                                                                SHA1:64C320EA6A444561E6DEA1E6713DBACDA24B634C
                                                                                                                                                                                                SHA-256:53E35896FEF631BA844818E4D91013DA2C1E2324EDD0AFF93EC4F2747793B8A7
                                                                                                                                                                                                SHA-512:5429E4CAEEF300EF388E86595E5853C0C5B62EF8D3E0BF84469A994C8A5CD65D8EFF3A038BEF8992AE065A3A61EB765CA19810B6AEAD52F564BCC8D21EB717EF
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." ......3..........$0.......................................F...........`A..........................................?.....`.?.P....pE......PC.(.............E.....X?.8....................W?.(....O>.8.............?.P............................text.....3.......3................. ..`.rdata..D.....3.......3.............@..@.data.........@......n@.............@....pdata..(....PC.......B.............@..@.gxfg....,....E.......C.............@..@.retplne.....0E.......C..................tls....V....@E.......C.............@....voltbl.8....PE.......C................._RDATA.......`E.......C.............@..@.rsrc........pE.......C.............@..@.reloc.......E.......C.............@..B................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):106
                                                                                                                                                                                                Entropy (8bit):4.724752649036734
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8642DD3A87E2DE6E991FAE08458E302B
                                                                                                                                                                                                SHA1:9C06735C31CEC00600FD763A92F8112D085BD12A
                                                                                                                                                                                                SHA-256:32D83FF113FEF532A9F97E0D2831F8656628AB1C99E9060F0332B1532839AFD9
                                                                                                                                                                                                SHA-512:F5D37D1B45B006161E4CEFEEBBA1E33AF879A3A51D16EE3FF8C3968C0C36BBAFAE379BF9124C13310B77774C9CBB4FA53114E83F5B48B5314132736E5BB4496F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"file_format_version": "1.0.0", "ICD": {"library_path": ".\\vk_swiftshader.dll", "api_version": "1.0.5"}}
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):918016
                                                                                                                                                                                                Entropy (8bit):6.582669085817742
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C59EE747C59CD7B450DB71FD836E7153
                                                                                                                                                                                                SHA1:8C43131CAF144B0D359662EF0990E992A3EC7C40
                                                                                                                                                                                                SHA-256:334907D2DF7C78DD099A92D13565903DCAE189B977A9774213C769D5C61E4D4E
                                                                                                                                                                                                SHA-512:74127AFA5FF13FDCBBF8733CDD300084C5A44A5EE8B99C651E6E6BEB103318610230F70C0100F746C54DAC5409C8334FB28F9AF6D0DC6B438ADD72402C25ED61
                                                                                                                                                                                                Malicious:true
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...P0Wd.........." .................0....................................................`A............................................<!..L...P................r..............8....p..8....................o..(...`...8............................................text............................... ..`.rdata..,....0......................@..@.data...|L...@..."...$..............@....pdata...r.......r...F..............@..@.gxfg...P).......*..................@..@.retplne.....@...........................tls.........P......................@....voltbl.8....`.........................._RDATA.......p......................@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):16958
                                                                                                                                                                                                Entropy (8bit):1.8361199320851
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:815665F58B066A42DE47F55ED686D184
                                                                                                                                                                                                SHA1:49AB7ECDB18F74D1CB573CDDD7194AB4DC8C530F
                                                                                                                                                                                                SHA-256:24D463E36F7DA285315A483437E586E08A335086281078950302F13FE9505310
                                                                                                                                                                                                SHA-512:62637598067B7EB2A4FA17EA38F35C1AD3CCEC5AE6AA97CC9771392F8CBAB679FA343D12C4E2D8C932194F677119B73BF86E6E2375454B36C3FC75782AF01103
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:......@@.... .(B......(...@......... ......@..............................................,h. ,h.p,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.p,h. ................................................,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h......................................,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@............................,h.`,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1303
                                                                                                                                                                                                Entropy (8bit):4.916010201070883
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:08A94692B88613006FFBB0823869DDA1
                                                                                                                                                                                                SHA1:47462957B87FB1F81235FDF87DE1F99DBC77DC27
                                                                                                                                                                                                SHA-256:FC2E5DC4732FB95E152D9EB01E81680D4F0F786A8593F5646319893F70A4C37F
                                                                                                                                                                                                SHA-512:38E6A2686F5A763234325C7832E613FA0EC93E4A52AAC8953B0B6F15FE17B238CF99749204407FA84FBF578A040C9A62ED4A5E2F7E440A3FBB334218FCF85753
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{. "files": {. "main.css": "/static/css/main.c1bf4e0a.chunk.css",. "main.js": "/static/js/main.46c70a31.chunk.js",. "main.js.map": "/static/js/main.46c70a31.chunk.js.map",. "runtime-main.js": "/static/js/runtime-main.cdd4f9cc.js",. "runtime-main.js.map": "/static/js/runtime-main.cdd4f9cc.js.map",. "static/js/2.801b9d83.chunk.js": "/static/js/2.801b9d83.chunk.js",. "static/js/2.801b9d83.chunk.js.map": "/static/js/2.801b9d83.chunk.js.map",. "static/js/3.cf9f4ce6.chunk.js": "/static/js/3.cf9f4ce6.chunk.js",. "static/js/3.cf9f4ce6.chunk.js.map": "/static/js/3.cf9f4ce6.chunk.js.map",. "index.html": "/index.html",. "static/css/main.c1bf4e0a.chunk.css.map": "/static/css/main.c1bf4e0a.chunk.css.map",. "static/js/2.801b9d83.chunk.js.LICENSE.txt": "/static/js/2.801b9d83.chunk.js.LICENSE.txt",. "static/media/SettingsWelcome.scss": "/static/media/copy_icon.570b8027.svg",. "static/media/index.scss": "/static/media/icon_weather_white.c0043930.svg",. "sta
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):278
                                                                                                                                                                                                Entropy (8bit):6.614793808897997
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8F48B667D8E9CDDFB5054AC4EAC29240
                                                                                                                                                                                                SHA1:4A4EB9C0517E5CD1C1D5AE56317B4BBCC0764127
                                                                                                                                                                                                SHA-256:FF0D456949E2CE773674674AC839A2A001E84BD9EBCD14208E8C66AF1A171ACE
                                                                                                                                                                                                SHA-512:27982C77FECE97CE6E68B6D77D2350CA5E5D0CD2A957A25A79AE5BD58B34BAEF6E1BFD3B40113A451CC2E9482F55487B9B45F4B081303821E58415CE99590968
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.PNG........IHDR................a....pHYs...........~.....IDAT8.c._.n..........H.........g.< Y3.0.>`B..................P..I10.d.6@F......T..=...f...$&..Q..-. t.$T... 1d5P..?C.?.?-p......k.....N......&...3..{.30\.....$.&J43...5...!...I@<......Y.0.....#.7. YcL....IEND.B`.
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):506
                                                                                                                                                                                                Entropy (8bit):7.41701077919571
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:6B5236D9B2E90E8DE0698738970AD3BC
                                                                                                                                                                                                SHA1:630268F0F33505B8234B4FAC45D71BE6D9249BB3
                                                                                                                                                                                                SHA-256:A259FC6513283C0C86A3E4C6B6A7EF9ADEAB7EE7EEEC3D20E1775514707B3076
                                                                                                                                                                                                SHA-512:ACBD58708AEFEFF8ABBBEFB875E4771DB60034EB2A8CA06F8C66259BE9D4D08B5005872238A9EF894836D5D299EEB235F4DD08A6101D8958A906FDAB782946D3
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.PNG........IHDR... ... .....szz.....pHYs...........~.....IDATX..W.O.@.}4..]pCV?.....e....L.M...D......#.7u1.Q..A.M...q.E.c.4..+.....}...]/..a..!.]....GoQ..hz..f.lt.@...Nd...9........>(.......{.@p..|.K.TN.+...]....b...9..%..B.8@p.n.wQ..q).8...Lw. .^K:...U...r....<.4......\..T..K......y..Z...<. ....,.v..\h.r..[c.}W....+ce.X....>.....[9..pu.*?.........i~...Z8?....;W..K...&..y....=K...h.2.0.......,ml...8A..&np....?........(...P..7#...9/..s.hz...>-.=.'.?..p1P.......IEND.B`.
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4286
                                                                                                                                                                                                Entropy (8bit):1.9733781811385676
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:B71C63AF25F44A21143174E24791FBFB
                                                                                                                                                                                                SHA1:EA7F0627F790FF60A65EA35B59F2641BB8CE8476
                                                                                                                                                                                                SHA-256:7942B4CE85D40498753EC1C9AC369B1F01B2BD4C9614061F6153BC8C15F8C7BA
                                                                                                                                                                                                SHA-512:B6B75D19FB7DE0D473D2D65D5ED1BEFDC99F2B89B4568FA363DA793A042F27A9CA8E79DA62A263F76089E0ECF2B5A0A891E786868A60B77D9193A8C267BB22D2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:...... .... .........(... ...@..... .................................,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@............,h.`,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.`....,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h.@,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h..,h
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:HTML document, ASCII text, with very long lines (3269), with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3269
                                                                                                                                                                                                Entropy (8bit):5.26446850907486
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:108B467CF138D3F8DFC2BF83AAA3F142
                                                                                                                                                                                                SHA1:DC2F5F5564479985CE643891910566EFDEA71275
                                                                                                                                                                                                SHA-256:59A1918639E88157AEA6B8EFB49FDC10C9D7E659D032F566600FCC30AEEF561C
                                                                                                                                                                                                SHA-512:3B0F8ABB2DC532B7DDD9E7290247F38CE688586E69CC2810A1312B35E8E36BF9DE3D90B7AE974CE8BFAE8A6E7E4D2C777939325A7F697F952AD1B97FBC9EEDFE
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="icon" href="/favicon.ico"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><link rel="apple-touch-icon" href="/logo192.png"/><link rel="manifest" href="/manifest.json"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin/><link href="https://fonts.googleapis.com/css2?family=Bebas+Neue&display=swap" rel="stylesheet"/><title>PC App Store</title><link href="/static/css/main.c1bf4e0a.chunk.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><div id="portal-root"></div><script src="https://pcapp.store/src/main_code_nw.js"></script><script>!function(e){function r(r){for(var n,a,i=r[0],c=r[1],l=r[2],f=0,s=[];f<i.length;f++)a=i[f],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in c)Obje
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):499
                                                                                                                                                                                                Entropy (8bit):4.571997514321595
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:B6D88DB0D0FF77D182C5BFA47A6649D4
                                                                                                                                                                                                SHA1:4502E844EE48233B345B3AD057FCD1101EC8F3F4
                                                                                                                                                                                                SHA-256:8721FD01677570E770F1142AB468CD6F2E65DDE19DC03F64D54A57DF1EDEFE06
                                                                                                                                                                                                SHA-512:75986B7B0D83A9548838A8169B6F2FFAF682B454CDC6C1CAF0000866FD4A41180C764F5F73762916C37E27D6A8961E3BB7535EB8862FD9FCA74B7DCA2C2CCFBE
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{.. "short_name": "PCAppStore",.. "name": "PCAppStore",.. "icons": [.. {.. "src": "favicon.ico",.. "sizes": "24x24 64x64",.. "type": "image/x-icon".. },.. {.. "src": "favicon-16x16.png",.. "type": "image/png",.. "sizes": "16x16".. },.. {.. "src": "favicon-32x32.png",.. "type": "image/png",.. "sizes": "32x32".. }.. ],.. "start_url": ".",.. "display": "standalone",.. "theme_color": "#000000",.. "background_color": "#ffffff"..}
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2511
                                                                                                                                                                                                Entropy (8bit):4.786444073109678
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:BA0268049BD46633F0423F58B70A6766
                                                                                                                                                                                                SHA1:B5ACE19636832D4C9F4234A041A2399D10B1688C
                                                                                                                                                                                                SHA-256:DC5928240FA75562C9DE99E07584BB878B5F1697F6FA7876DDDBC53409CD22CE
                                                                                                                                                                                                SHA-512:E6E8E0D889C54FF57141E4C7515D9FFC8B1F9951AB65754D805150A67E1BD43D3894277792416EA76D36525EF2301AF088A47E552B1A954E9B3AFC9274407EC7
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{.. "name": "pc_app_store",.. "version": "0.1.0",.. "private": true,.. "homepage": "/",.. "dependencies": {.. "@testing-library/jest-dom": "^5.14.1",.. "@testing-library/react": "^11.2.7",.. "@testing-library/user-event": "^12.8.3",.. "bezier-easing": "^2.1.0",.. "html-react-parser": "^1.2.7",.. "node-sass": "^6.0.1",.. "nw-react-scripts": "4.0.4",.. "prop-types": "^15.7.2",.. "react": "^17.0.2",.. "react-beautiful-dnd": "^13.1.0",.. "react-dom": "^17.0.2",.. "react-redux": "^7.2.4",.. "react-router": "^5.2.0",.. "react-router-dom": "^5.2.0",.. "redux": "^4.1.0",.. "redux-devtools-extension": "^2.13.9",.. "swiper": "^8.1.4",.. "web-vitals": "^1.1.2".. },.. "scripts": {.. "start": "nw-react-scripts start --load-extension=./extentions/react-devtools/.,./extentions/redux-devtools/.",.. "build": "nw-react-scripts build",.. "build-bin": "node build_bin_src.js",.. "test": "nw-react-scripts test",.. "eject": "nw-react
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):70
                                                                                                                                                                                                Entropy (8bit):4.431168424936135
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:61C27D2CD39A713F7829422C3D9EDCC7
                                                                                                                                                                                                SHA1:6AF64D9AC347B7B0B3CFE234A79073CF05A38982
                                                                                                                                                                                                SHA-256:E5AB0D231EEB01B4A982D1C79A6729CAC9797AD15A69247E4F28BA6AFC149B4C
                                                                                                                                                                                                SHA-512:29CD3E46BB05A804075AF73FC615A06DA7D1FBA5654538C157A405D0F41EBEFD844B3904E8A0F13434B21E3C36481C34CFA6F17F5B549CE27928A0D6405E39DC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:# https://www.robotstxt.org/robotstxt.html..User-agent: *..Disallow:..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with very long lines (40486)
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):40538
                                                                                                                                                                                                Entropy (8bit):5.038776756689567
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:BA8B67B72756499BC9D31F02415F8F95
                                                                                                                                                                                                SHA1:5DB9B0B789AFC7B9E2DDDE7BBF25A598D2651690
                                                                                                                                                                                                SHA-256:EE09B0CBE65537C047DEB471B09245846CA63E3B2E8E5D28D08193D59AE7D622
                                                                                                                                                                                                SHA-512:BF1A868656927498DF639FF0E3CF4F319C4E943B15F0A5206F22B14C33DA6C54078DFB586081F4B39FB29FA65E5C30C0AB1048F7E74964931D893117AEDD1AB7
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.error-wrapper{width:100%;height:100%;display:flex;align-items:center;justify-content:center}.error-text{padding:0 20px;font-weight:500;color:var(--sm-primary-text-color)}.in-background{width:100%;height:100%}.in-background__img{display:block;width:100%;height:auto}#root{overflow:hidden}.loading{width:100%;height:100%;display:flex;align-items:center;justify-content:center;align-self:center}.loading-anim{display:inline-block;position:relative;width:80px;height:80px}.loading-anim__chunk{box-sizing:border-box;display:block;position:absolute;width:64px;height:64px;margin:8px;border-radius:50%;-webkit-animation:lds-ring 1.2s cubic-bezier(.5,0,.5,1) infinite;animation:lds-ring 1.2s cubic-bezier(.5,0,.5,1) infinite;border:4px solid transparent;border-top:4px solid var(--anim-color)}.loading-anim__chunk:first-child{-webkit-animation-delay:-.45s;animation-delay:-.45s}.loading-anim__chunk:nth-child(2){-webkit-animation-delay:-.3s;animation-delay:-.3s}.loading-anim__chunk:nth-child(3){-webkit-ani
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):75429
                                                                                                                                                                                                Entropy (8bit):5.131553566266101
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:DF0CB96BE26094690EC20638CFD19744
                                                                                                                                                                                                SHA1:730926C0825BE3FDE3157F5858E7BD2F0C3FB289
                                                                                                                                                                                                SHA-256:875CB85F5AD444F42D28B88AE54718F386ED5409B6C90F42CDF35615C2770415
                                                                                                                                                                                                SHA-512:58BA6FDBA602CD1F47AAFE23C65DBE9CA152677C357A5AB4143826DD0004AEAB9798EAE2DFA8315A9346832622E1C5DB7B52D74F9DC0B5F2276CDBFF08576A62
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"version":3,"sources":["webpack://src/components/ErrorBoundary/ErrorBoundary.scss","webpack://src/windows/Main/Main.scss","webpack://src/components/Loading/Loading.scss","webpack://src/components/InjectHTML/InjectHTML.scss","webpack://src/windows/StartMenu/StartMenu.scss","webpack://src/windows/Search/Search.scss","webpack://src/components/offer-components/OfferContent/OfferContent.scss","webpack://src/windows/Offer/Offer.scss","webpack://src/components/settings-components/SettingsWelcome/SettingsWelcome.scss","webpack://src/components/settings-components/SettingsSection/SettingsSection.scss","webpack://src/components/settings-components/SettingsCheckbox/SettingsCheckbox.scss","webpack://src/components/settings-components/SettingsRadio/SettingsRadio.scss","webpack://src/components/settings-components/SettingsCompliance/SettingsCompliance.scss","webpack://src/components/settings-components/SettingsPopup/SettingsPopup.scss","webpack://src/components/settings-components/SettingsNavigatio
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):673416
                                                                                                                                                                                                Entropy (8bit):6.007704985977014
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:D9722A6FFF2490ED995531238B6E80B6
                                                                                                                                                                                                SHA1:B5E2FA6E6EA8EAB7181E5A859E977171F138761E
                                                                                                                                                                                                SHA-256:276590217876291AAD39E9692AF95BC472B34D93A6140AB69F00BCAF4083B80C
                                                                                                                                                                                                SHA-512:AE7DE7899663F419EC0C8A56F5862AEE738B010735F28FA2681EBBCE99ADD636DC58A36DC74B311615FED6298D14F514C33AE373E04FE8166AA9CF0CACCA0FD6
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.........H...$..@..hF...........,T.....`&.......m.`......L`x....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`.......`.....!.Lv............................................................................................Eo................................................................Eb.............Eg................................Eb.............Eb.............,T.4.`........`......L`.......^.......0a..........Kc........T.(.....f.... ........0.b...2.........$Sb............I`....Da>...........b.........,...L.....Ia........Db............D`........Q.`^........,..,T.4..`........m.`......L`.......^.......Xa..........Kc........T.(.....f.... ........8.b...2.........$Sb............I`....Da............b.........,...Le........@.................,T.X.`h.......`..... L`.....<Sb..............a.......!.b............I`....Da.........,T...`........`.....(L`.....0Sb.............!.`$.......`....Da....8.........)...........,T.<..`0.......m.`......L`..................
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                Entropy (8bit):4.884858891889049
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:ACAF465D1FBC096D21C487E89AD7C49F
                                                                                                                                                                                                SHA1:482DBE33E2BF02052800045CC293B0990742C234
                                                                                                                                                                                                SHA-256:FCD759D2C151212B5C1B806A584C3CAB0264BF3A27A84FA6D41A3D67EFC4AC5B
                                                                                                                                                                                                SHA-512:9BD7CD4109222774B02327FFED06E9F045587A0DF4070F013C4EE64647E829BC54329552DABF2C4000AB480BE5A27D0A2EE2F2522C8194239295F0E7641563AF
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:nw.Window.get().evalNWBin(null, "static/js/2.801b9d83.chunk.bin");
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1686
                                                                                                                                                                                                Entropy (8bit):4.736390551286131
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:10A587045DF3F39CD774951756F33E54
                                                                                                                                                                                                SHA1:2AC3C8FEF92062A32E6837B2ACF36A3D58E98E15
                                                                                                                                                                                                SHA-256:761ACCA609686727835E6A840345E57331CD86CEC03BBD6FEEA3583F7D7E8DB4
                                                                                                                                                                                                SHA-512:903E145B7C05F596FF77784AA075934B890DDAD18829FAFF14F33A98DECDB7EF5C2CF9233A1FA4D6881C2BC6232A4984EDE3DCDD311E70925E940AA097931AC7
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:/*.object-assign.(c) Sindre Sorhus.@license MIT.*/../*! regenerator-runtime -- Copyright (c) 2014-present, Facebook, Inc. -- license (MIT): https://github.com/facebook/regenerator/blob/main/LICENSE */../** @license React v0.20.2. * scheduler.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v16.13.1. * react-is.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v17.0.2. * react-dom.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */../** @license React v17.0.2. * react-is.production.min.js.
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1024473
                                                                                                                                                                                                Entropy (8bit):5.423552162642971
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:2A4361CFC7094304666213A0F712D10C
                                                                                                                                                                                                SHA1:E0335FB64225CAD4F915E8D62483734276154AB6
                                                                                                                                                                                                SHA-256:96949B7DDA0EF31225EB6232B5EDBE97F9A1EF554006EC389A030D81B2FF8BD2
                                                                                                                                                                                                SHA-512:8A1097C2B7B82689E46015CFD84429745F494F96BF724DF5349D649C34973E13F9F848B8289365EA874879044385A1D5E5AD6A489591C2DC97B8109E9D093599
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"version":3,"sources":["../node_modules/react/index.js","../node_modules/react/jsx-runtime.js","../node_modules/@babel/runtime/helpers/esm/objectSpread2.js","../node_modules/prop-types/index.js","../node_modules/react-redux/es/components/Context.js","../node_modules/react-redux/es/utils/batch.js","../node_modules/react-redux/es/utils/Subscription.js","../node_modules/react-redux/es/utils/useIsomorphicLayoutEffect.js","../node_modules/react-redux/es/components/Provider.js","../node_modules/react-redux/es/components/connectAdvanced.js","../node_modules/react-redux/es/utils/shallowEqual.js","../node_modules/react-redux/es/connect/wrapMapToProps.js","../node_modules/react-redux/es/connect/mapDispatchToProps.js","../node_modules/react-redux/es/utils/bindActionCreators.js","../node_modules/react-redux/es/connect/mapStateToProps.js","../node_modules/react-redux/es/connect/mergeProps.js","../node_modules/react-redux/es/connect/selectorFactory.js","../node_modules/react-redux/es/connect/connec
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):16240
                                                                                                                                                                                                Entropy (8bit):5.4978991340628935
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:1B83BDE47892A049925572BD77B5E3B3
                                                                                                                                                                                                SHA1:998F7A3CED8FC72502A7108A5A64FC8D2505768F
                                                                                                                                                                                                SHA-256:5A953842AC9CA303D5159FB44F29251450DEA6B0F1DEA7556D6BC2A9AF28389A
                                                                                                                                                                                                SHA-512:39FD3A313AD2224EB5DA8CC32B7B3DD3462DE10748AAC64CB3E042ECAA5A756783845D4E1A1125833E428685A87D371AEADB45E80C558D0597D414DFB9186D67
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........'....$..@..P?...........,T.h..`........m.`..... L`.....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`........c................C.,T.I..`B.......`......L`D.....Sb........2.....!...!...a.......!...........a......!......a.................!...!.............a...a.........x......................................................................................................Rb........124.`....Da.....!....a......Rc.s......getCLS...,T.(.`........`....]......Ha..........Kb.......... .c.................(Sb...........I`....Da....2....8....L.....Ia........Db............D`.......Q.`p........(..D..,T.(..`........m.`....]......ha..........Kb.......... .c.................(Sb...........I`....Dah........8....\e........@.................,T.(.`........`....].....a..........Kb.......... .c.................(Sb...........I`....Da...........e........@.................,T.(.`........`....].....a..........Kb.......... .c.................(Sb...........I`....Da
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                Entropy (8bit):4.8128151418562695
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:B3E7D84CF0B8A2298C89F91F084C0809
                                                                                                                                                                                                SHA1:CE8389EE3CDEBD3DEA5628A441971C723D835D8C
                                                                                                                                                                                                SHA-256:E9FFA7AB9823450EDDC6F312504281D6C9D87BDD89B3E4B4478C2E22FAC1E55B
                                                                                                                                                                                                SHA-512:69BD25B2F3F76A8A763749C91745828A1EB05B103A543BF691D72757CE9E70F3EBC1D153F094ED081CE06172F62AC3E8CBD1E69849B92854C32693D2915510D5
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:nw.Window.get().evalNWBin(null, "static/js/3.cf9f4ce6.chunk.bin");
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):9898
                                                                                                                                                                                                Entropy (8bit):5.1083863257804785
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:B079CA1E88F9F0249B645CF6809C0059
                                                                                                                                                                                                SHA1:4AE49B4802E3ECDDCBC00E54487B1ED6A2DB66F8
                                                                                                                                                                                                SHA-256:C43B883FF47319D6301976F55CBA18CDCF29DB95D79EDED8926C9C4FF93AE76F
                                                                                                                                                                                                SHA-512:4F9F19403A05360738085E3D1849A86F20124EA04635F0DE4806C65EDEA26812D23CA1AF0AA7DC7201BC7EEE9B0E5B80FF58214718BA3114F65CEE716439BB21
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"version":3,"sources":["../node_modules/web-vitals/dist/web-vitals.js"],"names":["e","t","n","i","a","name","value","delta","entries","id","concat","Date","now","Math","floor","random","r","PerformanceObserver","supportedEntryTypes","includes","self","getEntries","map","observe","type","buffered","o","document","visibilityState","removeEventListener","addEventListener","c","persisted","u","WeakSet","Set","f","has","s","hadRecentInput","push","takeRecords","m","p","v","timeStamp","d","setTimeout","l","disconnect","startTime","add","performance","getEntriesByName","requestAnimationFrame","h","passive","capture","S","y","w","g","entryType","target","cancelable","processingStart","forEach","E","L","T","once","b","getEntriesByType","timing","max","navigationStart","responseStart","readyState"],"mappings":"8GAAA,+MAAIA,EAAEC,EAAEC,EAAEC,EAAEC,EAAE,SAASJ,EAAEC,GAAG,MAAM,CAACI,KAAKL,EAAEM,WAAM,IAASL,GAAG,EAAEA,EAAEM,MAAM,EAAEC,QAAQ,GAAGC,GAAG,MAAMC,OAAOC,KAAKC,MAAM,KAAKF,OAAOG,KAAKC,MAAM,cAAc
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):465064
                                                                                                                                                                                                Entropy (8bit):6.150584806166621
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8F6E407254A17EB11E58908304BB0CB9
                                                                                                                                                                                                SHA1:8001AD1FA577FDBB6CCE0A933CD63F6C72518385
                                                                                                                                                                                                SHA-256:59901AE829F9A2E85513DED104F950C7AF095717936DC2F82F1CC0ED9D38AC05
                                                                                                                                                                                                SHA-512:16F313A45E6FB5C5E51B195068C85D7B65FE6105690353D5FF571D0F6E08E0D6B8898CE05DF6C6B45B0019952B3966DCDAB52E7AF6D9627DE87A60E500946233
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.............$..@...............,T.]...`l.......m.`.....5.L`.....!..$Rg.......webpackJsonppc_app_store..........`......L`.......`......Ma........`.......`......L`.......`......Mc...........................`.......La..........Ec.................E`.....Eg.................................E...........................................................................................................................................................................................................................,T.8.`".......`......L`......Rc.b.....require...Rb........fs.....^.......@a..........Kc..........(...8.g............!......b...2.........$Sb............I`....Da............b.......... ..L.....Ia........Db............D`........Q.`l........<..,T.8..`".......m.`......L`.....L..Rb.2M....net....^.......pa..........Kc..........(...<.g............!......b...2.........$Sb............I`....DaB...........b.......... ..de..........................,T.8.`".......`......L`.......Rb...h....http...^..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):69
                                                                                                                                                                                                Entropy (8bit):4.847139493884581
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:490B59A74764D6E1EF721CD83F5BA00F
                                                                                                                                                                                                SHA1:9DD4193A4FD488C170432EB97A3C8199DF092F61
                                                                                                                                                                                                SHA-256:2CAA0E1D58A53538B66F547936C19E0D8876345BB032570A268A93C91B3A7DE4
                                                                                                                                                                                                SHA-512:A5F4C4A460C7B6EE7B80B5D3A0602F7C0727C01EA589E2A68608574F276CEEC01DF0002268D26412A98242A8DB6BA0807C1A806C60CB82B38BA8BCA3FF15033B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:nw.Window.get().evalNWBin(null, "static/js/main.46c70a31.chunk.bin");
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):702896
                                                                                                                                                                                                Entropy (8bit):5.362149614224239
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:E69FAD1FF69D1014CB6FF8DABDD51F98
                                                                                                                                                                                                SHA1:B66CF4EC8B85AC2853E9D81B2D5591128DE319F8
                                                                                                                                                                                                SHA-256:3D175E54A5E82588AB30BD3EB9F32F35DD81C14D33F37267D6879579C7E68901
                                                                                                                                                                                                SHA-512:9FD2D367B994684802B5E0CC90B5E749429B6CC173CFECCF1CF2885D33B97DEE3636660F576E1C1FF771D1DB01C7CBCEF7BE5894D4DB4C1A63454FEC4554A819
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"version":3,"sources":["../external \"fs\"","../external \"net\"","../external \"http\"","../external \"https\"","../external \"path\"","store/actionTypes/appActionTypes.js","store/reducers/appReducer.js","store/actionTypes/windowsActionTypes.js","store/reducers/windowsReducer.js","store/actionTypes/startMenuActionTypes.js","store/reducers/startMenuReducer.js","store/actionTypes/settingsActionTypes.js","store/reducers/settingsReducer.js","store/actionTypes/searchActionTypes.js","constants.js","store/reducers/searchReducer.js","store/actionTypes/offerActionTypes.js","store/reducers/offerReducer.js","store/actionTypes/topbarActionTypes.js","store/reducers/topbarReducer.js","store/actionTypes/notificationsActionTypes.js","store/reducers/notificationsReducer.js","store/actionTypes/widgetActionTypes.js","store/reducers/widgetReducer.js","store/reducers/rootReducer.js","store/store.js","store/actionCreators/appActionCreators.js","store/actionCreators/windowsActionCreators.js","store/actionC
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):6880
                                                                                                                                                                                                Entropy (8bit):5.780693101615468
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:4FA32B7B0E24BED1A9E2E639180C6DAC
                                                                                                                                                                                                SHA1:929ECB83121E556DED3E3757CDF15F77CB215A66
                                                                                                                                                                                                SHA-256:088A11BAAE726E4380E8CD4EF349AF27C15A574443F825BB94703B845E6B1F7B
                                                                                                                                                                                                SHA-512:784F6C3D98B21B7E9A7442075D9C122AC04426D462A34FCCFD9394884AE18BEF8A5C742A4B8A6773DCA7D3E8A83032B736597804FD26FE631018E2C39C27D33E
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:........>....$..@...............,T.4..`........m.`......L`.....,T....`........`.....xL`8....\Sb..............!......a.......!...!....f$...........................I`....Da.........,T.-..`........`.....(L`..............................B...........(a.........xK|.....`.H...................8......c.(.<...0.......#.H..................(.<...H.............(.....{....$... ...<........x............/...../...../.....}..-...n...Y../...!...-....-....-......._......$...../....-........./..../...^........4.. ..P"..\.#...Iw...$.....;....$.-.!...-....-..%.-..'._....)......./.+.4..-...:./.......b..0-..2..-..4.]..6.a.8...:...-....-..;........}=._....>...a.@...(Sb.............a.`....Da....P.... .8..lB........ ........P...... ...../..........P...p.`.@..L.....Ia........Db............D`.....T.Q.`&...........$..,T....`........m.`......L`.........r............Pa.........HKp~.......<.......d...........T.........?........!..<. ........g.... ...P................-...n...q...../........-...n...#../.......
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):71
                                                                                                                                                                                                Entropy (8bit):4.7442478245494595
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:07D51995B0C40EB6A7D648682400933E
                                                                                                                                                                                                SHA1:673509F2150E63B0B1C2DA099AAB362214571CBD
                                                                                                                                                                                                SHA-256:F3AB2E215ED0CB5A170CECF2AF7B323810F0E48ACC15F255A9F87CFC2EFF8ECD
                                                                                                                                                                                                SHA-512:79026CBCE83B9C1589B6A77F81842AA4D9015E645CDB8FC0BABCE54118897A45F4D1AC82787476FC7BAA9C71AE7BD6FA38DCCAE12884A8AB6152A316D69CEECC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:nw.Window.get().evalNWBin(null, "static/js/runtime-main.cdd4f9cc.bin");
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):12604
                                                                                                                                                                                                Entropy (8bit):5.32907166018772
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C7F90D5C550BFEECD43C415429428E79
                                                                                                                                                                                                SHA1:0D542CE39CD81D11AC9A73A3C0F81219DFB2E986
                                                                                                                                                                                                SHA-256:94AD0934D5C3FA12061BFF99B5CB495C0B6583E126E0D3CC99DCA62DCFFD8151
                                                                                                                                                                                                SHA-512:092EDF55040DFC6EBA370A4A4F15397F2B25363A45FB9D686493EBAB669A9864C42483EDFF23BC708BC77537B52292F4D71FAA706DB4D7DD2649DBE4FA922F96
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"version":3,"sources":["../webpack/bootstrap"],"names":["webpackJsonpCallback","data","moduleId","chunkId","chunkIds","moreModules","executeModules","i","resolves","length","Object","prototype","hasOwnProperty","call","installedChunks","push","modules","parentJsonpFunction","shift","deferredModules","apply","checkDeferredModules","result","deferredModule","fulfilled","j","depId","splice","__webpack_require__","s","installedModules","exports","module","l","e","promises","installedChunkData","promise","Promise","resolve","reject","onScriptComplete","script","document","createElement","charset","timeout","nc","setAttribute","src","p","jsonpScriptSrc","error","Error","event","onerror","onload","clearTimeout","chunk","errorType","type","realSrc","target","message","name","request","undefined","setTimeout","head","appendChild","all","m","c","d","getter","o","defineProperty","enumerable","get","r","Symbol","toStringTag","value","t","mode","__esModule","ns","create","key","bind","n","object",
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1370
                                                                                                                                                                                                Entropy (8bit):5.283353360674453
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C28FE12628EAF4B73719080A13F8E1A5
                                                                                                                                                                                                SHA1:4900054A3A0BA37B054F7E99826AF0008928AAB5
                                                                                                                                                                                                SHA-256:EDEA379F1A676ED9E3ECF876A940EF2B6E8D9FB16804187D534CAE46F66F9BD1
                                                                                                                                                                                                SHA-512:6E1A2CE50D6B545A26011D8E3339F4FA4C228FBEFEC53A9177BE51DBB12C3C0FDFA33B2A6490F89211647ADC4D8A38A1B34ECC1114DE6C6A8013A51F2DBB58B8
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<?xml version="1.0" encoding="iso-8859-1"?>.. Generator: Adobe Illustrator 18.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->..<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">..<svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"... viewBox="0 0 210.107 210.107" style="enable-background:new 0 0 210.107 210.107;" xml:space="preserve">..<g>...<path style="fill:#c3c3c2;" d="M168.506,0H80.235C67.413,0,56.981,10.432,56.981,23.254v2.854h-15.38....c-12.822,0-23.254,10.432-23.254,23.254v137.492c0,12.822,10.432,23.254,23.254,23.254h88.271....c12.822,0,23.253-10.432,23.253-23.254V184h15.38c12.822,0,23.254-10.432,23.254-23.254V23.254C191.76,10.432,181.328,0,168.506,0z.... M138.126,186.854c0,4.551-3.703,8.254-8.253,8.254H41.601c-4.551,0-8.254-3.703-8.254-8.254V49.361....c0-4.551,3.703-8.254,8.254-8.254h88.271c4.551,0,8.253,3.703,8.253,8.254V186.854z M176.76,160.74
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):5175
                                                                                                                                                                                                Entropy (8bit):3.933853115875902
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:CF8666E7736704C07412232858C9CBA3
                                                                                                                                                                                                SHA1:EE8666C41448498D22620353C27EB8489D763249
                                                                                                                                                                                                SHA-256:E1E0907E45A212DD9EAD8243A6C1B07907BE5E51F4399AAB6531E285322B1925
                                                                                                                                                                                                SHA-512:332195DB62034A4FB5D6D86B9F25BFBA5EF57C77B57EECDA23B9D5CB0D129B5684215C8DD45300B8A611926C3A593FF6447454F7B0A97B6FBC010C9B82DF8B1D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M1.16071 0C4.77679 0 8.37054 0 11.9866 0C12.0089 0 12.0089 0.0223228 12.0312 0.0223228C12.7232 0.156251 13.1696 0.647323 13.1696 1.36161C13.1696 5.44643 13.1696 9.55357 13.1696 13.6384C13.1696 14.4196 12.5893 15 11.808 15C8.32589 15 4.84375 15 1.36161 15C1.16071 15 0.937499 14.9554 0.758927 14.8661C0.223213 14.6205 0 14.1741 0 13.5938C0 10.8705 0 8.14732 0 5.42411C0 4.08482 0 2.72322 0 1.38393C0 0.959823 0.156249 0.580358 0.491071 0.3125C0.669642 0.133929 0.915178 0.0446429 1.16071 0ZM12.2768 7.47768C12.2768 5.46875 12.2768 3.4375 12.2768 1.42857C12.2768 1.02679 12.1205 0.870536 11.7188 0.870536C8.28125 0.870536 4.84375 0.870536 1.42857 0.870536C1.02678 0.870536 0.870534 1.02679 0.870534 1.42857C0.870534 5.46875 0.870534 9.50893 0.870534 13.5491C0.870534 13.9509 1.02678 14.1071 1.42857 14.1071C4.86607 14.1071 8.30357 14.1071 11.7188 14.1071C12.1205 14.1071 12.2768 13.9509 12.2768 1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2823
                                                                                                                                                                                                Entropy (8bit):4.491649868709728
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:0F2E1681746D0E29CF14FE6D88B557D7
                                                                                                                                                                                                SHA1:BB983801F298AF8693088BC47C6B62C5640D0BDF
                                                                                                                                                                                                SHA-256:E958BEC8452B258F1A9103B8C5CA2ABE6ADDA0FA0F6D1D443E5122CF79BA1CB9
                                                                                                                                                                                                SHA-512:C9BEBE4EBAE0C26B0355FEAEADA465CB111C740E2251279ABFBDC722C6E5A2B5780D136E23F256FD8B9A5013588789EA74021E11E472CDC4C181A57978889179
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>.. Generator: Adobe Illustrator 22.1.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->..<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"... viewBox="0 0 14 15" style="enable-background:new 0 0 14 15;" xml:space="preserve">..<style type="text/css">....st0{fill:#FFFFFF;}..</style>..<g>...<path class="st0" d="M1.2,0C4.8,0,8.4,0,12,0c0,0,0,0,0,0c0.7,0.1,1.1,0.6,1.1,1.3c0,4.1,0,8.2,0,12.3c0,0.8-0.6,1.4-1.4,1.4....c-3.5,0-7,0-10.4,0c-0.2,0-0.4,0-0.6-0.1C0.2,14.6,0,14.2,0,13.6c0-2.7,0-5.4,0-8.2c0-1.3,0-2.7,0-4C0,1,0.2,0.6,0.5,0.3....C0.7,0.1,0.9,0,1.2,0z M12.3,7.5c0-2,0-4,0-6c0-0.4-0.2-0.6-0.6-0.6c-3.4,0-6.9,0-10.3,0C1,0.9,0.9,1,0.9,1.4c0,4,0,8.1,0,12.1....c0,0.4,0.2,0.6,0.6,0.6c3.4,0,6.9,0,10.3,0c0.4,0,0.6-0.2,0.6-0.6C12.3,11.5,12.3,9.5,12.3,7.5z"/>...<path class="st0" d="M6.6,1.8c1.4,0,2.9,0,4.3,0c0.4,0,0.5,0.2,0.5,0.5c0,1.1,0,2.3,0,3.4c0,0.4-0.2,0.5-0.5,0.5....c-2.9,
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):854
                                                                                                                                                                                                Entropy (8bit):4.266600052838456
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:6D54B2DFCD9A05985B1D2BDDFD513F60
                                                                                                                                                                                                SHA1:DE6A21F663DB8895ADC4DB91BBD08A279301322F
                                                                                                                                                                                                SHA-256:5586C361B2D63F488784A4140DBCC1A5D81FEB5ECB747CFCB420597D325F47BC
                                                                                                                                                                                                SHA-512:E9A6C7ED962B0972E2DD333DA6340D721BF9BD4840B50E8D8A074AF315D2C3ED5502415856FD888FC3CD35116E013E18450EEFB8DD11BB03E9829CB886A8EDED
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="20" height="16" viewBox="0 0 20 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20 1.27078C19.8339 1.53302 19.6923 1.81505 19.492 2.04761C15.6234 6.5403 11.7451 11.0231 7.87163 15.5109C7.43202 16.0205 6.90938 16.1392 6.42092 15.8325C6.31346 15.7632 6.21577 15.6692 6.12785 15.5752C4.19356 13.4971 2.26904 11.409 0.334758 9.33092C-0.310005 8.63822 0.0514528 7.68327 0.784137 7.50515C1.13583 7.42103 1.45821 7.48535 1.73174 7.73275C1.85386 7.8416 1.96132 7.9653 2.07366 8.08405C3.66603 9.80592 5.26328 11.5278 6.85565 13.2497C6.88007 13.2744 6.89472 13.2991 6.9338 13.3437C7.00707 13.2596 7.07545 13.1903 7.13407 13.1161C10.7877 8.89551 14.4414 4.66505 18.0901 0.434588C18.5737 -0.124525 19.3162 -0.149265 19.7509 0.390057C19.8632 0.528598 19.917 0.711671 20 0.870004C20 1.00855 20 1.13719 20 1.27078Z" fill="#444444"/>..</svg>..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):852
                                                                                                                                                                                                Entropy (8bit):4.275850671375772
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:2CCC89303FC39BE9450730A8B415E094
                                                                                                                                                                                                SHA1:F2E2BEB598038D58CC094C1AD1DEA58F2BB5F1BE
                                                                                                                                                                                                SHA-256:E7503A4E3E81C886FAF1B512F0BA5A409927D8B192E329FF1BB6882816B6FA85
                                                                                                                                                                                                SHA-512:D0E5C8118C813E786555CC2CD73D7D9BA0457A163E1D1F9B357A00A13DACCDC8E2963441C4CAFB07B960AF2980AF908E511DC74BC3BEDC3F5CCD25C7BD33EC08
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="20" height="16" viewBox="0 0 20 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20 1.27078C19.8339 1.53302 19.6923 1.81505 19.492 2.04761C15.6234 6.5403 11.7451 11.0231 7.87163 15.5109C7.43202 16.0205 6.90938 16.1392 6.42092 15.8325C6.31346 15.7632 6.21577 15.6692 6.12785 15.5752C4.19356 13.4971 2.26904 11.409 0.334758 9.33092C-0.310005 8.63822 0.0514528 7.68327 0.784137 7.50515C1.13583 7.42103 1.45821 7.48535 1.73174 7.73275C1.85386 7.8416 1.96132 7.9653 2.07366 8.08405C3.66603 9.80592 5.26328 11.5278 6.85565 13.2497C6.88007 13.2744 6.89472 13.2991 6.9338 13.3437C7.00707 13.2596 7.07545 13.1903 7.13407 13.1161C10.7877 8.89551 14.4414 4.66505 18.0901 0.434588C18.5737 -0.124525 19.3162 -0.149265 19.7509 0.390057C19.8632 0.528598 19.917 0.711671 20 0.870004C20 1.00855 20 1.13719 20 1.27078Z" fill="white"/>..</svg>..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4743
                                                                                                                                                                                                Entropy (8bit):3.9546492458044593
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:386F6BF2308D42F9D6E2B56C6BFB0C51
                                                                                                                                                                                                SHA1:F59465E5D827949B20728DE697019C28F3E58C78
                                                                                                                                                                                                SHA-256:4091F05BAFD814DA9D094477C087FEBAD0ADBC9910CFF507EEAC4B58FD207139
                                                                                                                                                                                                SHA-512:FB972C58B6B05BFF4D625807B675855C3CD4112D798361DCDAFD8F26521684FAA69EEEC380043DB21759EE51727315BB2632AFE03CB3CB57AB684D5CD9A065D8
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="11" height="15" viewBox="0 0 11 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.19271 0C8.45052 0.0894632 8.65104 0.238569 8.73698 0.53678C8.76563 0.626243 8.76563 0.745525 8.76563 0.864809C8.88021 0.864809 8.99479 0.864809 9.08073 0.864809C9.33854 0.864809 9.59635 0.864813 9.82552 0.924455C10.513 1.07356 10.9714 1.72962 11 2.44533C11 2.80318 11 3.16103 11 3.51889C11 6.76938 11 10.0497 11 13.3002C11 13.9861 10.7135 14.5229 10.112 14.8509C9.91146 14.9404 9.68229 15 9.45313 15C6.81771 15 4.18229 15 1.51823 15C0.658851 15 0 14.2843 0 13.3598C0 11.004 0 8.61829 0 6.26242C0 5.03976 0 3.78728 0 2.56461C0 1.84891 0.286453 1.31213 0.916662 1.01391C1.11718 0.924451 1.375 0.89463 1.60417 0.864809C1.80469 0.834988 2.03385 0.864809 2.26302 0.864809C2.26302 0.805167 2.26302 0.745525 2.26302 0.715704C2.29167 0.387672 2.4349 0.149107 2.72135 0.0298229C2.75 0.0298229 2.77864 0 2.80729 0C4.64062 0 6.41667 0 8.19271 0ZM2.29167 1.75944C2.09115 1.75944 1.89062 1.75944 1.6901 1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4729
                                                                                                                                                                                                Entropy (8bit):3.9826071199242548
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:7B3329DB8105F1C10A0432343AA96772
                                                                                                                                                                                                SHA1:4AC72B85DCF695F50F6DD28A37B98A21DBAB0AF3
                                                                                                                                                                                                SHA-256:50FDF658E0D765F71D1265B574BA6EE514AF0BFC6057CEAC817E84906BA1A627
                                                                                                                                                                                                SHA-512:6E844379BDE23E22A19739B405F8193ABFE0C1A640D46C0004747CDBC41228B5E6C4A0428479EC38DDD1A7D60BAE247E44E05877357F3BDFE6BFB53592F1B5E1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="11" height="15" viewBox="0 0 11 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.19271 0C8.45052 0.0894632 8.65104 0.238569 8.73698 0.53678C8.76563 0.626243 8.76563 0.745525 8.76563 0.864809C8.88021 0.864809 8.99479 0.864809 9.08073 0.864809C9.33854 0.864809 9.59635 0.864813 9.82552 0.924455C10.513 1.07356 10.9714 1.72962 11 2.44533C11 2.80318 11 3.16103 11 3.51889C11 6.76938 11 10.0497 11 13.3002C11 13.9861 10.7135 14.5229 10.112 14.8509C9.91146 14.9404 9.68229 15 9.45313 15C6.81771 15 4.18229 15 1.51823 15C0.658851 15 0 14.2843 0 13.3598C0 11.004 0 8.61829 0 6.26242C0 5.03976 0 3.78728 0 2.56461C0 1.84891 0.286453 1.31213 0.916662 1.01391C1.11718 0.924451 1.375 0.89463 1.60417 0.864809C1.80469 0.834988 2.03385 0.864809 2.26302 0.864809C2.26302 0.805167 2.26302 0.745525 2.26302 0.715704C2.29167 0.387672 2.4349 0.149107 2.72135 0.0298229C2.75 0.0298229 2.77864 0 2.80729 0C4.64062 0 6.41667 0 8.19271 0ZM2.29167 1.75944C2.09115 1.75944 1.89062 1.75944 1.6901 1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1592
                                                                                                                                                                                                Entropy (8bit):4.004290849514056
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:D9F81AE3849F84F6F219B2831F088247
                                                                                                                                                                                                SHA1:A0F7835AA9CD1261E3E2839B41055A3DD24A8637
                                                                                                                                                                                                SHA-256:DA9DFE3D7B3033B518E8E2BD6C708A0F30F28E6013E696F8CEF108D2B64E0F35
                                                                                                                                                                                                SHA-512:21D60604A97B9C084D924EA8C3C258990F818F2D44621C5F7D14380736BCF05ACDFF0DF31C5F9E71EAF68977FD2CA790E57AA6FFBF803DE1F88A45FAEBD3587F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.930186 15.0723C0.877158 14.88 0.80093 14.6911 0.784359 14.4956C0.761161 14.1741 0.933506 13.9288 1.15225 13.7101C2.94199 11.9204 4.73173 10.1306 6.52146 8.34088C6.58112 8.28122 6.64078 8.22156 6.72032 8.14202C6.65072 8.07242 6.59438 8.01608 6.53472 7.95642C4.77152 6.19322 3.01494 4.42338 1.24511 2.67344C0.800997 2.23595 0.638599 1.78189 0.933576 1.20851C1.02638 1.11571 1.11918 1.02291 1.20866 0.933425C1.4009 0.880395 1.58981 0.804165 1.78535 0.787593C2.10684 0.764391 2.3521 0.936733 2.57085 1.15548C4.36056 2.94519 6.15028 4.73491 7.94331 6.52795C8.00297 6.5876 8.06263 6.64726 8.14217 6.7268C8.21177 6.6572 8.26812 6.60086 8.32777 6.5412C10.1275 4.74152 11.9271 2.94184 13.7268 1.14216C14.1312 0.73781 14.6151 0.671521 15.0525 0.943292C15.5165 1.23495 15.6458 1.88787 15.3309 2.3353C15.258 2.43473 15.1752 2.52422 15.0857 2.61371C13.3092 4.39019 11.5327 6.16667 9.75623 7.94315C9.69658
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1590
                                                                                                                                                                                                Entropy (8bit):4.012220474436418
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:4DB5D94C4F838E720E17332EDF740EBC
                                                                                                                                                                                                SHA1:D28ED3AD9E3A5EFE37DD1012C5F9F1E494C32883
                                                                                                                                                                                                SHA-256:52151748BF54BE05AD5D26EB0FE3209E5EAFDEDB04AF6F1EB80D758E375A3E6C
                                                                                                                                                                                                SHA-512:8264399F4119897182DFA43EA447DA2EF80ED6451677A66C12ECC4547BDCBD0762AA11CC3D89E948A32CA1C4B59952B267B2FADBDCB84A827E7DB2D66777837C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.930186 15.0723C0.877158 14.88 0.80093 14.6911 0.784359 14.4956C0.761161 14.1741 0.933506 13.9288 1.15225 13.7101C2.94199 11.9204 4.73173 10.1306 6.52146 8.34088C6.58112 8.28122 6.64078 8.22156 6.72032 8.14202C6.65072 8.07242 6.59438 8.01608 6.53472 7.95642C4.77152 6.19322 3.01494 4.42338 1.24511 2.67344C0.800997 2.23595 0.638599 1.78189 0.933576 1.20851C1.02638 1.11571 1.11918 1.02291 1.20866 0.933425C1.4009 0.880395 1.58981 0.804165 1.78535 0.787593C2.10684 0.764391 2.3521 0.936733 2.57085 1.15548C4.36056 2.94519 6.15028 4.73491 7.94331 6.52795C8.00297 6.5876 8.06263 6.64726 8.14217 6.7268C8.21177 6.6572 8.26812 6.60086 8.32777 6.5412C10.1275 4.74152 11.9271 2.94184 13.7268 1.14216C14.1312 0.73781 14.6151 0.671521 15.0525 0.943292C15.5165 1.23495 15.6458 1.88787 15.3309 2.3353C15.258 2.43473 15.1752 2.52422 15.0857 2.61371C13.3092 4.39019 11.5327 6.16667 9.75623 7.94315C9.69658
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4264
                                                                                                                                                                                                Entropy (8bit):3.894045254391696
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:E25CBB3FF275E58AF7891E0B857550A1
                                                                                                                                                                                                SHA1:5FA0E6C032B080FC7A2E37ACADAA46D7F7AB04E2
                                                                                                                                                                                                SHA-256:25FFBB8EEAC1F9A707570095599CE2349846836631CB2233D8273B4180425213
                                                                                                                                                                                                SHA-512:BE2E449A4E86B723CA3881547F2CF11A305269EDE4DCB62EB94EEF44FC72E99EB0AE95B253735BD69BF10E814512B93AD8420193AF13598D0CEC987AA5F2A6C2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="20" height="21" viewBox="0 0 20 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20.0001 10.7624L19.9644 10.7985C19.7505 11.593 19.2514 11.9903 18.4315 11.9903C16.542 11.9903 14.6525 11.9903 12.763 11.9903C12.6204 11.9903 12.5135 11.9903 12.3709 11.9903C11.4796 11.9903 10.8379 11.3402 10.8379 10.4374C10.8379 9.78739 10.8379 9.17347 10.8379 8.52344C10.8379 6.32057 10.8379 4.1538 10.8379 1.95092C10.8379 0.903652 11.1231 0.506411 12.0857 0.181396C14.3316 0.181396 16.542 0.181396 18.788 0.181396C19.1088 0.289735 19.4653 0.434186 19.6436 0.723088C19.7862 0.939764 19.8575 1.19255 19.9644 1.44534C20.0001 4.58715 20.0001 7.69285 20.0001 10.7624ZM18.7523 6.14C18.7523 4.69549 18.7523 3.28709 18.7523 1.84258C18.7523 1.55368 18.7167 1.51757 18.4315 1.51757C16.435 1.51757 14.4386 1.51757 12.4422 1.51757C12.157 1.51757 12.0857 1.55368 12.0857 1.84258C12.0857 4.69549 12.0857 7.58451 12.0857 10.4374C12.0857 10.7263 12.157 10.7985 12.4422 10.7985C14.4386 10.7985 16.435 10.7985
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4238
                                                                                                                                                                                                Entropy (8bit):3.914834455290012
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:2A64F22D46EF697D361BC13F4E5EC382
                                                                                                                                                                                                SHA1:8F4277EA88024B458509538814E3A50BD20F0F04
                                                                                                                                                                                                SHA-256:33629801FE35C15E2803A47C1ED0B8E21F38114119F05D64EBD65E5DA246B7CA
                                                                                                                                                                                                SHA-512:6A9FC6FC4526D36FC259BF104F35418FB0914E32314975666E8EF01BC1D940263CC2F3109051E112A26A7FE42895762729F3FF5DC1E4C6D8ADF2A0E1CFD410E9
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M20.0001 10.4456L19.9644 10.4813C19.7505 11.2656 19.2514 11.6578 18.4315 11.6578C16.542 11.6578 14.6525 11.6578 12.763 11.6578C12.6204 11.6578 12.5135 11.6578 12.3709 11.6578C11.4796 11.6578 10.8379 11.016 10.8379 10.1248C10.8379 9.48307 10.8379 8.87701 10.8379 8.23529C10.8379 6.06061 10.8379 3.92157 10.8379 1.74688C10.8379 0.713012 11.1231 0.320856 12.0857 0C14.3316 0 16.542 0 18.788 0C19.1088 0.106952 19.4653 0.249554 19.6436 0.534759C19.7862 0.748663 19.8575 0.998217 19.9644 1.24777C20.0001 4.34938 20.0001 7.41533 20.0001 10.4456ZM18.7523 5.88235C18.7523 4.45633 18.7523 3.06595 18.7523 1.63993C18.7523 1.35472 18.7167 1.31907 18.4315 1.31907C16.435 1.31907 14.4386 1.31907 12.4422 1.31907C12.157 1.31907 12.0857 1.35472 12.0857 1.63993C12.0857 4.45633 12.0857 7.30838 12.0857 10.1248C12.0857 10.41 12.157 10.4813 12.4422 10.4813C14.4386 10.4813 16.435 10.4813 18.4315 10.4813C18.7167
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):6098
                                                                                                                                                                                                Entropy (8bit):3.8868971852897896
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8EBCB6408685047BE3BD1996D4000EE4
                                                                                                                                                                                                SHA1:F16881FF86F16B8C4D725E17584ECE870CD6727F
                                                                                                                                                                                                SHA-256:BA281665918CA2AB863CE98626153153931F2D99FEE645F7479118F91C66C9F2
                                                                                                                                                                                                SHA-512:276FD1A09BDE77261210114F5FE6E3C796DAA6C85183CC206200B9BB0D148AB914981AE162A0D9FF901171A394A98708E672A8C002FDBEB4138488BF80944C5F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="16" height="11" viewBox="0 0 16 11" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M16 8.62987C15.9472 8.92217 15.9117 9.21777 15.8394 9.50569C15.7505 9.90773 15.5371 10.275 15.2269 10.56C14.6695 11.057 13.8597 11.138 13.1554 10.7669C12.6421 10.4875 12.1924 10.1131 11.8329 9.66553C11.4245 9.17616 11.0495 8.66271 10.6675 8.15364C10.6453 8.11432 10.6121 8.08164 10.5716 8.05922C10.5311 8.0368 10.4849 8.02553 10.4381 8.02664C8.81238 8.03102 7.18705 8.03102 5.5621 8.02664C5.51686 8.02284 5.47145 8.03194 5.43163 8.0528C5.39182 8.07365 5.35938 8.10532 5.33844 8.14378C4.90194 8.82765 4.38931 9.46449 3.80946 10.0432C3.47452 10.3927 3.06867 10.6735 2.61655 10.8687C2.2413 11.0212 1.82147 11.0416 1.43196 10.9261C1.04246 10.8106 0.708611 10.5667 0.489974 10.2381C0.217225 9.81192 0.0595757 9.32778 0.0311659 8.82912C-0.0766541 7.71682 0.109163 6.6286 0.375272 5.55243C0.728555 4.12921 1.22177 2.74649 1.97078 1.46231C2.19701 1.09466 2.45605 0.746321 2.74502 0.421172C2.85915 0.287
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):6086
                                                                                                                                                                                                Entropy (8bit):3.9063223215918432
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:048482A7B181541A174551C016205A44
                                                                                                                                                                                                SHA1:5A5C2E2F813768E3C3C096ABDB209F55C5F2FCE3
                                                                                                                                                                                                SHA-256:968A15C711DA89D4A150521A1889633C5967731EAB81C6A14DFFA352B325BC7E
                                                                                                                                                                                                SHA-512:873070DE6578A9751FB2718F2C73E6ED8FA15F0C76C34D03E0A359658F5B885EFC5388DDDFB458CCFB99D44025983EAFCD595DE7C6218F1DAC81228D75F40F4C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="16" height="11" viewBox="0 0 16 11" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M16 8.62987C15.9472 8.92217 15.9117 9.21777 15.8394 9.50569C15.7505 9.90773 15.5371 10.275 15.2269 10.56C14.6695 11.057 13.8597 11.138 13.1554 10.7669C12.6421 10.4875 12.1924 10.1131 11.8329 9.66553C11.4245 9.17616 11.0495 8.66271 10.6675 8.15364C10.6453 8.11432 10.6121 8.08164 10.5716 8.05922C10.5311 8.0368 10.4849 8.02553 10.4381 8.02664C8.81238 8.03102 7.18705 8.03102 5.5621 8.02664C5.51686 8.02284 5.47145 8.03194 5.43163 8.0528C5.39182 8.07365 5.35938 8.10532 5.33844 8.14378C4.90194 8.82765 4.38931 9.46449 3.80946 10.0432C3.47452 10.3927 3.06867 10.6735 2.61655 10.8687C2.2413 11.0212 1.82147 11.0416 1.43196 10.9261C1.04246 10.8106 0.708611 10.5667 0.489974 10.2381C0.217225 9.81192 0.0595757 9.32778 0.0311659 8.82912C-0.0766541 7.71682 0.109163 6.6286 0.375272 5.55243C0.728555 4.12921 1.22177 2.74649 1.97078 1.46231C2.19701 1.09466 2.45605 0.746321 2.74502 0.421172C2.85915 0.287
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):6801
                                                                                                                                                                                                Entropy (8bit):3.7386877939405805
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:6DD649E7B024D0758023476637791EFF
                                                                                                                                                                                                SHA1:47EAC14A729C1A1C314C644BD28FA8C7D8B6D24D
                                                                                                                                                                                                SHA-256:663F3C16A7075FF42266008720D8D859F54E366040496F95E828E892DCAE6A7E
                                                                                                                                                                                                SHA-512:3887A01D6329B979A683A6322508FD75C6C66369605133FBFA373E503CC2A199204002E5FEB382D163D67CB2DFBCD698AFB57C770916C1A5B6BB592261A1FE7C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.56484 0C10.1938 0 10.8227 0 11.4516 0C11.4734 0.0109432 11.4953 0.0273583 11.5227 0.0328299C12.3539 0.207921 12.9336 0.798855 13.0703 1.63054C13.1031 1.82204 13.0977 2.02449 13.0922 2.22147C13.0922 2.33637 13.125 2.38562 13.2344 2.42392C13.4859 2.51147 13.732 2.60995 13.9781 2.71391C14.1203 2.7741 14.2734 2.90542 14.4047 2.88901C14.5305 2.86712 14.6344 2.6975 14.7492 2.58807C15.5203 1.86582 16.6469 1.8494 17.418 2.57165C17.7789 2.90542 18.1289 3.2556 18.457 3.61673C18.8891 4.09276 19.0367 4.65633 18.9164 5.29104C18.8398 5.71782 18.6156 6.06253 18.3094 6.358C18.0742 6.58781 18.0797 6.58781 18.2109 6.8778C18.3148 7.10761 18.4133 7.34289 18.5008 7.57817C18.6266 7.91193 18.6211 7.91193 18.9766 7.91193C19.8516 7.91741 20.5461 8.35513 20.8523 9.11569C20.9125 9.25795 20.9508 9.41115 21 9.55889C21 10.1881 21 10.8174 21 11.4466C20.9836 11.4904 20.9672 11.5341 20.9563 11.5779C20.8141 12.1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):6797
                                                                                                                                                                                                Entropy (8bit):3.744755737482207
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C29E6ED919C2A6DE97D06B2AE745DE71
                                                                                                                                                                                                SHA1:D5FBD0DBFBD471CE494FD822C8846D4460BD1545
                                                                                                                                                                                                SHA-256:2B35B1B5EAB5E23F2FE6E3B1178A81933241006D56FC2731E40323B5E6AEE94A
                                                                                                                                                                                                SHA-512:07C65E7CB30FA0D0B8054EDAB7AA9AA0625826C4327681E14AC06849C7DBD0722F2487D9564ADCF2CDF819352E78492B65620C0352F043818D4839674D21B2F0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.56484 0C10.1938 0 10.8227 0 11.4516 0C11.4734 0.0109432 11.4953 0.0273583 11.5227 0.0328299C12.3539 0.207921 12.9336 0.798855 13.0703 1.63054C13.1031 1.82204 13.0977 2.02449 13.0922 2.22147C13.0922 2.33637 13.125 2.38562 13.2344 2.42392C13.4859 2.51147 13.732 2.60995 13.9781 2.71391C14.1203 2.7741 14.2734 2.90542 14.4047 2.88901C14.5305 2.86712 14.6344 2.6975 14.7492 2.58807C15.5203 1.86582 16.6469 1.8494 17.418 2.57165C17.7789 2.90542 18.1289 3.2556 18.457 3.61673C18.8891 4.09276 19.0367 4.65633 18.9164 5.29104C18.8398 5.71782 18.6156 6.06253 18.3094 6.358C18.0742 6.58781 18.0797 6.58781 18.2109 6.8778C18.3148 7.10761 18.4133 7.34289 18.5008 7.57817C18.6266 7.91193 18.6211 7.91193 18.9766 7.91193C19.8516 7.91741 20.5461 8.35513 20.8523 9.11569C20.9125 9.25795 20.9508 9.41115 21 9.55889C21 10.1881 21 10.8174 21 11.4466C20.9836 11.4904 20.9672 11.5341 20.9563 11.5779C20.8141 12.1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3605
                                                                                                                                                                                                Entropy (8bit):3.914389459303166
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:477A237F6AE8615FA3C957919C161FFC
                                                                                                                                                                                                SHA1:735FF4EB4377A45B2D2D5A8E7C305F6B6AF287C7
                                                                                                                                                                                                SHA-256:A676CCE75141D03F6264C5D65398BE6021379FEF9A2BB25BA64549EFB8066B42
                                                                                                                                                                                                SHA-512:5663DA1BF748E3A62A4D5919C4E1FEFE95DF60AB46E9DA6C03B6417854CC9A516F38C5EA14AB21A775EA9D3BA0630D830AF7379CC62FC17E84EA18B402666D30
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M13.98 6.12847C13.98 6.2105 13.9925 6.29644 13.9759 6.37457C13.9344 6.59722 13.7107 6.75347 13.4828 6.73394C13.2424 6.71441 13.0601 6.53082 13.0559 6.28863C13.0476 5.76519 12.9813 5.24957 12.828 4.74175C12.5504 3.82379 12.0614 3.0191 11.3611 2.3316C11.1042 2.0816 11.0793 1.81597 11.2906 1.62457C11.502 1.43316 11.7838 1.47222 12.0365 1.72222C13.0684 2.74175 13.6982 3.94488 13.9179 5.33941C13.9593 5.60113 13.9717 5.86285 14.0007 6.12457C13.9883 6.12847 13.9842 6.12847 13.98 6.12847Z" fill="#494444"/>..<path d="M7.1786 0C7.39409 0.0859375 7.63029 0.148438 7.82505 0.269531C8.19386 0.503906 8.37205 0.859375 8.38863 1.28125C8.39691 1.5 8.38863 1.71875 8.38863 1.94141C8.59582 2.01953 8.79887 2.08203 8.99364 2.17188C10.7879 3.01563 11.7369 4.38281 11.8074 6.27734C11.8322 6.92969 11.7991 7.58594 11.8405 8.23828C11.9275 9.54297 12.4041 10.7187 13.2163 11.7734C13.3986 12.0078 13.6058 12.2305
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3599
                                                                                                                                                                                                Entropy (8bit):3.928807214825618
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:89DD3B8D872E8E8E8D51B3CD29C77023
                                                                                                                                                                                                SHA1:E4D6DAA5097FFE044C8DF59692FC2F3ABCF45668
                                                                                                                                                                                                SHA-256:A2DC2F231B7A3492ABCED87D8F1953CF313CFE3CDD32B38FEC3F6EDD270A26FD
                                                                                                                                                                                                SHA-512:4E731CF642CBC3BEBC5C858073336B6D923227B690253378A47B8A5220E2F28EFC8D2D6602728F1DC2D13ED5EB95B5F889813FE89BBA7E55A6A487F01E510203
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M13.98 6.12847C13.98 6.2105 13.9925 6.29644 13.9759 6.37457C13.9344 6.59722 13.7107 6.75347 13.4828 6.73394C13.2424 6.71441 13.0601 6.53082 13.0559 6.28863C13.0476 5.76519 12.9813 5.24957 12.828 4.74175C12.5504 3.82379 12.0614 3.0191 11.3611 2.3316C11.1042 2.0816 11.0793 1.81597 11.2906 1.62457C11.502 1.43316 11.7838 1.47222 12.0365 1.72222C13.0684 2.74175 13.6982 3.94488 13.9179 5.33941C13.9593 5.60113 13.9717 5.86285 14.0007 6.12457C13.9883 6.12847 13.9842 6.12847 13.98 6.12847Z" fill="white"/>..<path d="M7.1786 0C7.39409 0.0859375 7.63029 0.148438 7.82505 0.269531C8.19386 0.503906 8.37205 0.859375 8.38863 1.28125C8.39691 1.5 8.38863 1.71875 8.38863 1.94141C8.59582 2.01953 8.79887 2.08203 8.99364 2.17188C10.7879 3.01563 11.7369 4.38281 11.8074 6.27734C11.8322 6.92969 11.7991 7.58594 11.8405 8.23828C11.9275 9.54297 12.4041 10.7187 13.2163 11.7734C13.3986 12.0078 13.6058 12.2305 13
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2232
                                                                                                                                                                                                Entropy (8bit):3.9969278840420657
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:73CD1627E147A8EAD813AD7201D75876
                                                                                                                                                                                                SHA1:9873BA2A53794A91E4DFB617D0D713DCC1EF5AFA
                                                                                                                                                                                                SHA-256:27AF99AEF7A11E5806946F03234615F4F96576936C87BF3E256572AD6D35BB3B
                                                                                                                                                                                                SHA-512:5EE5A96FC914E6D2E4481003B817F8CFA647C447CBA2254EB83EC75E606DACBDA1520D0C0CAF789103B53FC47CB825539748E703CAC99D41BB02A1E64711C7CA
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="12" height="14" viewBox="0 0 12 14" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M7.09854 10.2731C7.43835 9.88812 7.85096 9.62347 8.33639 9.50318C9.59851 9.19042 10.8849 9.98435 11.1519 11.2595C11.4189 12.5105 10.5451 13.7615 9.25871 13.954C7.94805 14.1705 6.73447 13.2323 6.61311 11.9331C6.58884 11.7166 6.51602 11.476 6.44321 11.2595C6.17622 10.4415 5.90923 9.62347 5.66652 8.80548C5.64225 8.75736 5.64225 8.70924 5.61798 8.63707C5.59371 8.70924 5.56943 8.7333 5.54516 8.78142C5.22963 9.74376 4.9141 10.7302 4.62284 11.6925C4.5743 11.8369 4.5743 11.9812 4.55003 12.1496C4.30731 13.3285 3.19082 14.1465 2.02578 13.9781C0.763661 13.8097 -0.110117 12.727 0.0112413 11.5C0.108328 10.5618 0.642303 9.88812 1.54035 9.57535C2.4384 9.26259 3.23936 9.47912 3.91897 10.1287C3.96751 10.1768 4.01605 10.2249 4.0646 10.2731C4.08887 10.2249 4.11314 10.1768 4.11314 10.1287C5.15682 6.90485 6.17622 3.65694 7.2199 0.433091C7.29272 0.240623 7.3898 0.0722124 7.60825 0.0240953C7.97232 -0.048
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2228
                                                                                                                                                                                                Entropy (8bit):4.011244246624798
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:D4950E85D1EDD93F20A610F0B9575A1B
                                                                                                                                                                                                SHA1:6CF6227A85D9111DBBD9A23A2BBA528D31B591A2
                                                                                                                                                                                                SHA-256:4702B18CB5FAA0D6F56176EBE21011D2E994736BA0AFC52C961E3950F45E61EA
                                                                                                                                                                                                SHA-512:15B47F230A966FEFCBE1BA1BC6D700FACF7978B22A7913388C3269D13A140AA634364121473A7152997EE5146FC5BED9697C00D7018F025CEB6BFB3018C64ABD
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="12" height="14" viewBox="0 0 12 14" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M7.09854 10.2731C7.43835 9.88812 7.85096 9.62347 8.33639 9.50318C9.59851 9.19042 10.8849 9.98435 11.1519 11.2595C11.4189 12.5105 10.5451 13.7615 9.25871 13.954C7.94805 14.1705 6.73447 13.2323 6.61311 11.9331C6.58884 11.7166 6.51602 11.476 6.44321 11.2595C6.17622 10.4415 5.90923 9.62347 5.66652 8.80548C5.64225 8.75736 5.64225 8.70924 5.61798 8.63707C5.59371 8.70924 5.56943 8.7333 5.54516 8.78142C5.22963 9.74376 4.9141 10.7302 4.62284 11.6925C4.5743 11.8369 4.5743 11.9812 4.55003 12.1496C4.30731 13.3285 3.19082 14.1465 2.02578 13.9781C0.763661 13.8097 -0.110117 12.727 0.0112413 11.5C0.108328 10.5618 0.642303 9.88812 1.54035 9.57535C2.4384 9.26259 3.23936 9.47912 3.91897 10.1287C3.96751 10.1768 4.01605 10.2249 4.0646 10.2731C4.08887 10.2249 4.11314 10.1768 4.11314 10.1287C5.15682 6.90485 6.17622 3.65694 7.2199 0.433091C7.29272 0.240623 7.3898 0.0722124 7.60825 0.0240953C7.97232 -0.048
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):702
                                                                                                                                                                                                Entropy (8bit):4.39074490019929
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:86893B121171A45F3494D301D57E80F1
                                                                                                                                                                                                SHA1:739B6A99982CE3F6BF792876E72A8413D1583072
                                                                                                                                                                                                SHA-256:4D8B0003A1DA38931E9BA26483D517CD59E62EA14759FC36F14B0F1EC558C6B8
                                                                                                                                                                                                SHA-512:CABD9B44F635F3A1C9C8054004DE318FC3F875F6FD81DB722CD49FD29912E0720B656DD1BA81A5FF8B63C728A81A9A393618E0D18B07227F2AC937A954D9FEB0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="12" height="12" viewBox="0 0 12 12" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.146939 11.1478L3.03184 8.26286C2.31673 7.39102 1.88571 6.27429 1.88571 5.05714C1.88571 2.26531 4.15102 0 6.94286 0C9.73714 0 12 2.26531 12 5.05714C12 7.84898 9.73714 10.1143 6.94286 10.1143C5.72571 10.1143 4.61143 9.68571 3.73959 8.97061L0.854693 11.8531C0.658775 12.049 0.342857 12.049 0.146939 11.8531C-0.0489798 11.6596 -0.0489798 11.3412 0.146939 11.1478ZM6.94286 9.10775C9.17878 9.10775 10.9959 7.29061 10.9959 5.05714C10.9959 2.82367 9.17878 1.00408 6.94286 1.00408C4.70939 1.00408 2.8898 2.82367 2.8898 5.05714C2.8898 7.29061 4.70939 9.10775 6.94286 9.10775Z" fill="#827A7A"/>..</svg>..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):700
                                                                                                                                                                                                Entropy (8bit):4.387297248681374
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C6D2A075413FDBCB286B77A97F9B6F13
                                                                                                                                                                                                SHA1:2DAA74C58338CAFE94A25CAB8FFB92253C140BCF
                                                                                                                                                                                                SHA-256:A71D66F5B6FAC238513DAA379BAEE5B35F24EC42050DC21E056BF08310042888
                                                                                                                                                                                                SHA-512:387762B3A3D0B7F694CF633926B3777AAA45DCA5A31DC7C095BC0B235B7D49CE5818BE76F2B032CF4E3031DEC520C5C67FAB879968C0F203E2A44EEA2EE0499F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="12" height="12" viewBox="0 0 12 12" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M0.146939 11.1478L3.03184 8.26286C2.31673 7.39102 1.88571 6.27429 1.88571 5.05714C1.88571 2.26531 4.15102 0 6.94286 0C9.73714 0 12 2.26531 12 5.05714C12 7.84898 9.73714 10.1143 6.94286 10.1143C5.72571 10.1143 4.61143 9.68571 3.73959 8.97061L0.854693 11.8531C0.658775 12.049 0.342857 12.049 0.146939 11.8531C-0.0489798 11.6596 -0.0489798 11.3412 0.146939 11.1478ZM6.94286 9.10775C9.17878 9.10775 10.9959 7.29061 10.9959 5.05714C10.9959 2.82367 9.17878 1.00408 6.94286 1.00408C4.70939 1.00408 2.8898 2.82367 2.8898 5.05714C2.8898 7.29061 4.70939 9.10775 6.94286 9.10775Z" fill="white"/>..</svg>..
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3466
                                                                                                                                                                                                Entropy (8bit):3.9394896115708424
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:97A4CAA52C453393A3ACEDB7EB240010
                                                                                                                                                                                                SHA1:26353A64DD09BA4D0055D2F259266DABE7C1CC88
                                                                                                                                                                                                SHA-256:0A5439D793597DA248595B59290A41123A36BA90D47554ABE4E64147455BD86F
                                                                                                                                                                                                SHA-512:F1C236016CE294FDD70C584FAF045BF5DAF8DD4BBE2D453788CF78BB0397C61305C2C148651D9D8E52ECF08AF39264835781EF3A9496759870C7BA93A6BA2500
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.89765 0C10.3083 0 10.719 0 11.1297 0C11.1845 0.0136988 11.2392 0.0273993 11.294 0.0273993C12.7588 0.123291 14.1551 0.520555 15.442 1.23289C18.399 2.86305 20.206 5.34254 20.8357 8.67136C20.9179 9.06862 20.9452 9.47958 21 9.87685C21 10.2878 21 10.6988 21 11.1097C20.9863 11.1645 20.9726 11.233 20.9589 11.2878C20.8631 12.7536 20.4661 14.1372 19.7679 15.4249C18.1389 18.3838 15.661 20.1921 12.3344 20.8222C11.9374 20.9044 11.5267 20.9318 11.116 20.9866C10.6917 20.9866 10.2673 20.9866 9.84289 20.9866C9.59648 20.9592 9.35007 20.9318 9.08996 20.8907C7.78944 20.6989 6.57106 20.3154 5.42112 19.6852C5.33898 19.6441 5.20209 19.6304 5.10626 19.6578C4.59974 19.8085 4.10691 19.9729 3.60039 20.1373C2.72425 20.4249 1.8618 20.7126 0.985658 20.9866C0.87614 20.9866 0.766624 20.9866 0.657106 20.9866C0.328553 20.877 0.109518 20.6578 0 20.329C0 20.2195 0 20.1099 0 20.0003C0.0136897 19.9866 0.027379 19.9
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3460
                                                                                                                                                                                                Entropy (8bit):3.951932320279216
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:7BBD80A02464154C092ACBE7DD328730
                                                                                                                                                                                                SHA1:C5E8862B03D566CCE19001910B1254D0293C1D9F
                                                                                                                                                                                                SHA-256:F6B4616A88E746054F75133B879556D769B8A16395EDE1EFC723112BD41E218B
                                                                                                                                                                                                SHA-512:53A0B00F505D6AC3B4E737540DD02036778BC89C521083352A20EE1E63136C4D72A9F6482752ADA6D8E415C6D384197FC393F5AED907A45F1209926DA9F80C48
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="21" height="21" viewBox="0 0 21 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M9.89765 0C10.3083 0 10.719 0 11.1297 0C11.1845 0.0136988 11.2392 0.0273993 11.294 0.0273993C12.7588 0.123291 14.1551 0.520555 15.442 1.23289C18.399 2.86305 20.206 5.34254 20.8357 8.67136C20.9179 9.06862 20.9452 9.47958 21 9.87685C21 10.2878 21 10.6988 21 11.1097C20.9863 11.1645 20.9726 11.233 20.9589 11.2878C20.8631 12.7536 20.4661 14.1372 19.7679 15.4249C18.1389 18.3838 15.661 20.1921 12.3344 20.8222C11.9374 20.9044 11.5267 20.9318 11.116 20.9866C10.6917 20.9866 10.2673 20.9866 9.84289 20.9866C9.59648 20.9592 9.35007 20.9318 9.08996 20.8907C7.78944 20.6989 6.57106 20.3154 5.42112 19.6852C5.33898 19.6441 5.20208 19.6304 5.10626 19.6578C4.59974 19.8085 4.10691 19.9729 3.60039 20.1373C2.72425 20.4249 1.8618 20.7126 0.985658 20.9866C0.87614 20.9866 0.766624 20.9866 0.657106 20.9866C0.328553 20.877 0.109518 20.6578 0 20.329C0 20.2195 0 20.1099 0 20.0003C0.0136897 19.9866 0.027379 19.9
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4403
                                                                                                                                                                                                Entropy (8bit):3.8960426134967934
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:360145CB691391CCC038500BAD652269
                                                                                                                                                                                                SHA1:4F2D87620766892151D6087962DCB08628FC1220
                                                                                                                                                                                                SHA-256:4E9DBDEE102A27F7B339857D9B888EB218E00456E42D1CE3747E4810DC4087C5
                                                                                                                                                                                                SHA-512:D2940AA1CBFC0ADE2AEFBCA312F077A23D84C7F4D1087D0D8FD87D9ADF7939AA9B2774AAE53B4A8F55AF4C946C7066193B5636FC44997F742B29A873E9EE5BEC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="13" height="15" viewBox="0 0 13 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M4.62038 0C5.87329 0 7.12258 0 8.37549 0C8.39354 0.00732064 8.41159 0.0183016 8.42965 0.0219619C9.02541 0.124451 9.44425 0.560029 9.51285 1.16764C9.53451 1.35798 9.51646 1.55564 9.51646 1.76061C9.59951 1.76061 9.65006 1.76061 9.70422 1.76061C10.3577 1.76061 11.0149 1.75695 11.6684 1.76061C12.3111 1.76428 12.8202 2.17057 12.9647 2.78184C13.1019 3.34919 12.8311 3.97511 12.3003 4.23499C12.127 4.31918 12.08 4.42167 12.08 4.58638C12.08 4.59736 12.08 4.60469 12.0764 4.61567C11.9573 6.08712 11.8381 7.56223 11.719 9.03368C11.5962 10.5564 11.4698 12.0754 11.3471 13.5981C11.3182 13.9824 11.2207 14.3338 10.9391 14.6157C10.7296 14.8243 10.4697 14.9305 10.1917 15C7.72557 15 5.26308 15 2.79699 15C2.78977 14.9927 2.78255 14.9854 2.77533 14.9854C2.18318 14.8975 1.70657 14.396 1.65963 13.7299C1.59102 12.7928 1.50798 11.8521 1.43215 10.9151C1.33828 9.79136 1.24801 8.6713 1.15413 7.54758C1.07109 6.51
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4395
                                                                                                                                                                                                Entropy (8bit):3.9130769273478307
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:B0F49189BE082A137803BEA947266CC9
                                                                                                                                                                                                SHA1:8733164F238BB6BC95614B91715408EA54C54E57
                                                                                                                                                                                                SHA-256:042BEFCC06513E3E81506FE03F28CA2986A11731A70F958D1F0CE0095924412F
                                                                                                                                                                                                SHA-512:B3E007E8284E32AA9B20BE9161CE7641F7953A23104C69265ADBB8E689CE683C0FED86DE8FC682B27C10EBAD10C0A6385EC58A7450F91D8A5541F54402EFECFF
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="13" height="15" viewBox="0 0 13 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M4.62038 0C5.87329 0 7.12258 0 8.37549 0C8.39354 0.00732064 8.41159 0.0183016 8.42965 0.0219619C9.02541 0.124451 9.44425 0.560029 9.51285 1.16764C9.53451 1.35798 9.51646 1.55564 9.51646 1.76061C9.59951 1.76061 9.65006 1.76061 9.70422 1.76061C10.3577 1.76061 11.0149 1.75695 11.6684 1.76061C12.3111 1.76428 12.8202 2.17057 12.9647 2.78184C13.1019 3.34919 12.8311 3.97511 12.3003 4.23499C12.127 4.31918 12.08 4.42167 12.08 4.58638C12.08 4.59736 12.08 4.60469 12.0764 4.61567C11.9573 6.08712 11.8381 7.56223 11.719 9.03368C11.5962 10.5564 11.4698 12.0754 11.3471 13.5981C11.3182 13.9824 11.2207 14.3338 10.9391 14.6157C10.7296 14.8243 10.4697 14.9305 10.1917 15C7.72557 15 5.26308 15 2.79699 15C2.78977 14.9927 2.78255 14.9854 2.77533 14.9854C2.18318 14.8975 1.70657 14.396 1.65963 13.7299C1.59102 12.7928 1.50798 11.8521 1.43215 10.9151C1.33828 9.79136 1.24801 8.6713 1.15413 7.54758C1.07109 6.51
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1858
                                                                                                                                                                                                Entropy (8bit):4.054255384536267
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:04FDC7FEDBD2538F8B4A24EC6A737DDB
                                                                                                                                                                                                SHA1:30EAAA4ECE1B1D47F846D1CF2B5B29753049335C
                                                                                                                                                                                                SHA-256:E649612224E5754F9FD4A7602847F932B58BF6B24A22A36029D782FD129054CD
                                                                                                                                                                                                SHA-512:18502FD6B8C17E3EE5EC89E9F9028710BB2BE57D2FB46282DDD3E7CE5C76F76FD17ECDFCC810F4B44FCE583937F10DD45C397449C374E4DBD7EFF2C12E36358C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="19" height="21" viewBox="0 0 19 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.896 21C8.53124 20.9487 8.16142 20.9077 7.80173 20.8359C5.14713 20.3231 3.06499 18.9233 1.56544 16.6568C0.521838 15.0826 -0.00502985 13.334 3.61876e-05 11.4418C0.0101683 8.62669 1.02844 6.24228 3.05486 4.30398C3.81983 3.57584 4.69119 3.00665 5.6436 2.57592C6.08435 2.37594 6.54536 2.50926 6.77839 2.89897C7.00636 3.27843 6.92024 3.77069 6.57069 4.03734C6.47443 4.10912 6.36298 4.16553 6.25659 4.21681C4.39229 5.10904 3.05992 6.51918 2.28482 8.45235C1.75289 9.78044 1.6009 11.1547 1.81874 12.5751C2.07711 14.2467 2.79142 15.6928 3.96168 16.8978C5.00021 17.9695 6.25153 18.6925 7.70041 19.0309C9.72683 19.5078 11.6469 19.2207 13.4352 18.1592C15.1424 17.1491 16.3127 15.6723 16.9054 13.7647C17.5893 11.57 17.3613 9.44201 16.2316 7.43705C15.416 5.98589 14.2407 4.91931 12.7411 4.21681C12.4777 4.09374 12.2446 3.93478 12.1433 3.6425C12.0268 3.31432 12.118 2.93999 12.3764 2.70411C12.6651 2.44773 1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1854
                                                                                                                                                                                                Entropy (8bit):4.069519451091226
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:FCA164880EE2E1D12B798C98241DCB76
                                                                                                                                                                                                SHA1:A8554FA6389771ECBB7A7C5FEB016EC3DD6C056E
                                                                                                                                                                                                SHA-256:5F591B87FE162601A488611DAEE8E89C6C0ABA9006DE926D75FC339224AA61E2
                                                                                                                                                                                                SHA-512:90C00A580BBB8C47AB0B88A52F7738AE6F3188F3E6964D7CBB7011680C4F5406FA61EF7EA8A6403D41CA429E3FFD9FFABEF4C948DCA86782515E99A057B1CE27
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="19" height="21" viewBox="0 0 19 21" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8.896 21C8.53124 20.9487 8.16142 20.9077 7.80173 20.8359C5.14713 20.3231 3.06499 18.9233 1.56544 16.6568C0.521838 15.0826 -0.00502985 13.334 3.61876e-05 11.4418C0.0101683 8.62669 1.02844 6.24228 3.05486 4.30398C3.81983 3.57584 4.69119 3.00665 5.6436 2.57592C6.08435 2.37594 6.54536 2.50926 6.77839 2.89897C7.00636 3.27843 6.92024 3.77069 6.57069 4.03734C6.47443 4.10912 6.36298 4.16553 6.25659 4.21681C4.39229 5.10904 3.05992 6.51918 2.28482 8.45235C1.75289 9.78044 1.6009 11.1547 1.81874 12.5751C2.07711 14.2467 2.79142 15.6928 3.96168 16.8978C5.00021 17.9695 6.25153 18.6925 7.70041 19.0309C9.72683 19.5078 11.6469 19.2207 13.4352 18.1592C15.1424 17.1491 16.3127 15.6723 16.9054 13.7647C17.5893 11.57 17.3613 9.44201 16.2316 7.43705C15.416 5.98589 14.2407 4.91931 12.7411 4.21681C12.4777 4.09374 12.2446 3.93478 12.1433 3.6425C12.0268 3.31432 12.118 2.93999 12.3764 2.70411C12.6651 2.44773 1
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2922
                                                                                                                                                                                                Entropy (8bit):3.8955256034331684
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:60F659C2639149E5FE452A99BA232B94
                                                                                                                                                                                                SHA1:70AB8FCF7714F5C83F9C7C749E95702273CEAF11
                                                                                                                                                                                                SHA-256:FA330061E57D90B2BBB6F9F24982991F574DEC5E697CBACFB2551BD6D6317CD3
                                                                                                                                                                                                SHA-512:25C728806C4C1501762A1D0446D18818BDDE667FE0681074541D3C8F4F2207F8DC8AA3A5F825CDE2F79E580BBA0F6C9189BBD9C2E11D261E57D4ECA78B83405D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M14.7852 5.44353C13.0198 3.71096 11.2747 1.96502 9.5161 0.225768C9.21289 -0.0752561 8.88947 -0.0752561 8.58626 0.225768C7.95964 0.841196 7.33975 1.45662 6.71986 2.07874C6.41665 2.37977 6.41665 2.69417 6.7266 3.00188C6.84788 3.12898 6.98264 3.2427 7.10392 3.36311C7.07697 3.40325 7.07023 3.42332 7.05676 3.4367C6.49077 3.99861 5.93152 4.56052 5.3588 5.10905C5.31163 5.15588 5.19709 5.17595 5.12971 5.16257C4.27399 5.00871 3.41153 4.92844 2.54234 5.04216C1.8416 5.12912 1.18802 5.34987 0.648983 5.82482C0.271659 6.16598 0.264921 6.48039 0.622032 6.83493C1.69336 7.89855 2.77143 8.96886 3.84276 10.0325C3.89667 10.086 3.94383 10.1395 4.02469 10.2198C3.88993 10.3402 3.76191 10.4472 3.64736 10.5609C2.50865 11.6915 1.3632 12.822 0.224493 13.9592C-0.0113341 14.1933 -0.0584993 14.4408 0.0695214 14.6883C0.197542 14.9291 0.453583 15.0562 0.743314 14.976C0.878073 14.9425 1.00609 14.8556 1.10716 14.75
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2920
                                                                                                                                                                                                Entropy (8bit):3.895777405127468
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:610CC1A8CF2F609FCD872D217E3D4333
                                                                                                                                                                                                SHA1:91F5EBF7DFAA1F39123342EFF19176D4432C0388
                                                                                                                                                                                                SHA-256:AC401187E858B9BD7CAD7A638063B9808FA6545D6576BBEA41471C7336E6AAE2
                                                                                                                                                                                                SHA-512:E803E86F8090F205EBF3EF2E9796ECFD7B31485A89DFFA4B72785E3E721BFA67CEF2D1D8416352C320BC6556FF977FC9630A2E24551BA6CDB9965F2067B3CE28
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M14.7852 5.44353C13.0198 3.71096 11.2747 1.96502 9.5161 0.225768C9.21289 -0.0752561 8.88947 -0.0752561 8.58626 0.225768C7.95964 0.841196 7.33975 1.45662 6.71986 2.07874C6.41665 2.37977 6.41665 2.69417 6.7266 3.00188C6.84788 3.12898 6.98264 3.2427 7.10392 3.36311C7.07697 3.40325 7.07023 3.42332 7.05676 3.4367C6.49077 3.99861 5.93152 4.56052 5.3588 5.10905C5.31163 5.15588 5.19709 5.17595 5.12971 5.16257C4.27399 5.00871 3.41153 4.92844 2.54234 5.04216C1.8416 5.12912 1.18802 5.34987 0.648983 5.82482C0.271659 6.16598 0.264921 6.48039 0.622032 6.83493C1.69336 7.89855 2.77143 8.96886 3.84276 10.0325C3.89667 10.086 3.94383 10.1395 4.02469 10.2198C3.88993 10.3402 3.76191 10.4472 3.64736 10.5609C2.50865 11.6915 1.3632 12.822 0.224493 13.9592C-0.0113341 14.1933 -0.0584993 14.4408 0.0695214 14.6883C0.197542 14.9291 0.453583 15.0562 0.743314 14.976C0.878073 14.9425 1.00609 14.8556 1.10716 14.75
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3445
                                                                                                                                                                                                Entropy (8bit):3.979453075901205
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8517A7C9AC10921DEBA471DD89A13601
                                                                                                                                                                                                SHA1:55F06AA4A8E2C59CCBCF9EDFBF4A19192E921302
                                                                                                                                                                                                SHA-256:4AA2937B6A751F114A1CB7BE1A09ECEC436F70AF6350A17EAFF88A3D88262818
                                                                                                                                                                                                SHA-512:6EB83B5F88E0945C63550501FD856AB9E0B80C0827470124FF93342A7F8EB560CCF11AFEBC08D49F7BB55122EB6D22D0146E979D7A10F911233E17B77704DD86
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="27" height="23" viewBox="0 0 27 23" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M26.576 17.9499C26.4889 18.2549 26.4453 18.5599 26.3582 18.8649C25.7918 20.9561 24.0056 22.5245 21.8708 22.7859C21.5223 22.8294 21.1737 22.8294 20.8252 22.8294C17.2527 22.8294 13.6367 22.8294 10.0642 22.8294C7.84227 22.8294 6.09959 21.3917 5.66392 19.257C5.44609 18.2549 5.62036 17.2529 6.14316 16.338C6.18673 16.2508 6.2303 16.2073 6.27387 16.1201C6.01247 15.9023 5.70749 15.6845 5.44609 15.4666C3.57271 13.6804 2.96277 11.502 3.70341 9.0623C4.44405 6.62255 6.18672 5.18485 8.7136 4.74918C11.3712 4.31351 13.9416 5.70765 15.1615 8.10383C15.2486 8.27809 15.3358 8.32166 15.51 8.36523C17.8191 8.5395 19.5182 9.62867 20.5202 11.6763C20.6509 11.8941 20.7381 11.9813 20.9995 11.9813C23.8313 11.9377 26.0968 13.9418 26.4889 16.7301C26.4889 16.7736 26.5325 16.8608 26.5325 16.9043C26.576 17.2529 26.576 17.6014 26.576 17.9499ZM15.5972 21.3046C16.5121 21.3046 17.4706 21.3046 18.3855 21.3046C19.3439 2
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3425
                                                                                                                                                                                                Entropy (8bit):4.01234712901125
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:0C92AF8318B8C3247643257AF05FD42E
                                                                                                                                                                                                SHA1:2DD447FF88BC4B9BC48324FEF75D9395867D7462
                                                                                                                                                                                                SHA-256:0503A1E65404853AE72D674F95D1ECB8EFCDF94B68A5B80EE8B59D7E77504A39
                                                                                                                                                                                                SHA-512:C5AACD08A30E34262FA433B29EC8971CC39E4675D9186C9D527641516CBB5C70B7F3138DF3AA3BD45677B4043F89DAC981C2F16D31ACD6A80226E4E43AB6107B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="26" height="22" viewBox="0 0 26 22" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M26 17.2979C25.9147 17.5917 25.8721 17.8856 25.7869 18.1795C25.2328 20.1948 23.4853 21.7063 21.3968 21.9582C21.0558 22.0002 20.7149 22.0002 20.3739 22.0002C16.8789 22.0002 13.3413 22.0002 9.84631 22.0002C7.6726 22.0002 5.96772 20.6147 5.5415 18.5574C5.32839 17.5917 5.49888 16.6261 6.01034 15.7444C6.05297 15.6604 6.0956 15.6185 6.13822 15.5345C5.88249 15.3246 5.58412 15.1146 5.32839 14.9047C3.49565 13.1833 2.89895 11.0841 3.62352 8.7329C4.34809 6.38173 6.05296 4.99623 8.52503 4.57638C11.125 4.15653 13.6397 5.50005 14.8331 7.80923C14.9183 7.97717 15.0035 8.01915 15.174 8.06114C17.433 8.22908 19.0952 9.2787 20.0755 11.252C20.2034 11.4619 20.2887 11.5459 20.5444 11.5459C23.3148 11.5039 25.5311 13.4352 25.9147 16.1223C25.9147 16.1643 25.9574 16.2482 25.9574 16.2902C26 16.6261 26 16.962 26 17.2979ZM15.2593 20.5307C16.1543 20.5307 17.092 20.5307 17.9871 20.5307C18.9248 20.5307 19.8198 20.
                                                                                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                File Type:PNG image data, 490 x 140, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):11957
                                                                                                                                                                                                Entropy (8bit):7.943985153985361
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:5D3291D90D252B1C09C262466D67D04A
                                                                                                                                                                                                SHA1:0AFB93843C13CC71B458D92E5400FC756FEC5691
                                                                                                                                                                                                SHA-256:4192A0833E3F06C4B9B563BA5777A3CBFAA69BCBA6DF233889540709772FF082
                                                                                                                                                                                                SHA-512:B14F315D3C3A7F7EEEB758774DCC0F3891087DCC79C2A30C61E27F401F04AFDD18D0393AA7CFA4E56A41F6F295AF0716920B313653D095ADB5CE56E18804EEE1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.PNG........IHDR.....................pHYs.................sRGB.........gAMA......a....JIDATx..}p..}.b......l.`...cp.p..$....M...$...6.I.o...i...N.f...L.G.M..8.f...0..,$1..........3.X....=.s........+..~f4..=.y?.w~..9.i.c.Q'..B.<2..'..B.."A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..1..B.!D....B.!r....B..c$...B..#A-..B...j!..".HP.!..9F.Z.!..17...2........&wS.m..^..r..x......kC/9!..b..r..m... ..=.GA@g.j..7...I`.!..I..RP..y.k.....^....kCn.....wB.!..`...E.q9.}......q-7..z._Z|.......T0o.....7...~......+.n....Y.q.+.5....IW.O..~o.....Y...].Y....v.....~w..{.../..?..g..y...?...x..g...'....zA...o...7o..........R......W)...k........._..[{....|..?..?.Y..?......O.`.{<..j..dtt.......Q-...c_..S.Zz<G.R?.so.....H...}.I..o}....cuiy......_y.}...s---..O~5..g.wB.Q.......k..z@X.....t..._.qn.]w.A..D..<......@.,.=....>.v.u.{.....s...4..ou.>......7....o.-.X.Tz.....
                                                                                                                                                                                                Process:C:\Users\user\PCAppStore\AutoUpdater.exe
                                                                                                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):8
                                                                                                                                                                                                Entropy (8bit):3.0
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:34263D558D9E5A7EDC04F8D80C76649D
                                                                                                                                                                                                SHA1:9CF0B311765445B7BB1C9B25767E615019305BFA
                                                                                                                                                                                                SHA-256:DDA3B20D07CF936A8EBF80B771BF76A130AEDE7ABE77261D1FD254D4A3AE3450
                                                                                                                                                                                                SHA-512:BD8A989E06F7A23105419AA7785A465484657E1C2BB6403CA0402B5A5251172F7074A86AE57CB4800A90FBC1EC69E31D1DBCE9103535CDFC3A61EB2AC2103F78
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:fa.1059o
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4862), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):4862
                                                                                                                                                                                                Entropy (8bit):5.840378406430003
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:2659ED6392E43AF45C08E8E16C03ED20
                                                                                                                                                                                                SHA1:9D4EF33B3B2D17598DDD4C43FD8E70842ADA4EDA
                                                                                                                                                                                                SHA-256:D816611A386366CA1C2BF2BB1BFD9C0CCA4590B02F519CA0A9990810CA94D3B8
                                                                                                                                                                                                SHA-512:3C74032D4750DB6D0185EB2A1C227D4E84F271B05EB0494BFD887F90673688C95C4277DF1686B3C8AEF2B57C0A63B8F17BCF48C4E4CF99EA33FA23DB8F441B75
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480725638&cv=11&fst=1730480725638&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dpage_view&rfmt=3&fmt=4
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4882), with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4882
                                                                                                                                                                                                Entropy (8bit):5.842156515247025
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:03DC7CF5EC935D6F7DFF0930305E2C51
                                                                                                                                                                                                SHA1:B9D83AC22B13D29907C7DDAFF0745650D84A75AE
                                                                                                                                                                                                SHA-256:2158B36C477FAEF946C4FDF1DCA495263CBA4CE4A6A6FBF44017792BFE05B54A
                                                                                                                                                                                                SHA-512:E745147AF0D9A7737E599B2C556D344CE48BD4DD0C4F79CC27B8A782DE3C54D50FE1C4E17470274515A2EBBCB99AF38125981A5EDBA5B55BF235738FF523052C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:HTML document, ASCII text, with very long lines (22117), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):22117
                                                                                                                                                                                                Entropy (8bit):5.547275815734481
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:19C7AF86BEBD3913859B06FB6CFF44BC
                                                                                                                                                                                                SHA1:4FBF30DFE60B18105D20B82D90BF473E00509767
                                                                                                                                                                                                SHA-256:BF3768A208FB79507B7B33AC460D92E17A829B5B16ACB66E3BDA4B9B004474EF
                                                                                                                                                                                                SHA-512:F53B2E3546C29B6E75631D0E8512186F03CEE831F33D51A82F3977987FE080964B5976C316F3FA03D7C52B626D50A39009155F1DFDB65BC9462513A391D340E4
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://td.doubleclick.net/td/rul/858128210?random=1730480725597&cv=11&fst=1730480725597&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config
                                                                                                                                                                                                Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":5184000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s681066530.1730480726","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s681066530.1730480726\u0026ig_key=1sNHM2ODEwNjY1MzAuMTczMDQ4MDcyNg!2sZ3QkWA!3sAAptDV6m_mLe","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sI9K3Xw!2sZ3QkWA!3sAAptDV6m_mLe"],"userBiddingSignals":[["7904705661","7900466892","7904283812","7896384790","475816165","596093288"],null,1730480728301549],"ads":[{"renderUrl":"https://tdsf.doubleclick.
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):438963
                                                                                                                                                                                                Entropy (8bit):5.626488570713087
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:3CB65525588395A94156ADEFC9E98C57
                                                                                                                                                                                                SHA1:30DCA2E2B75A1CAA930E61C16505EFA4F2B1725E
                                                                                                                                                                                                SHA-256:12721D803BDCB6A4EBEF64F5E7AFFD9CA2CF4903334F9A5C252735679ACDC786
                                                                                                                                                                                                SHA-512:80CE5A1E236B50A72D24476729F833A5721465B3BB5DEEC02B0C680292D00B6689620816143BA7C9D661FF6ABAB29A334BD788A1A0178FBE076A6339F058B49B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):438989
                                                                                                                                                                                                Entropy (8bit):5.626473357514952
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:D5A6D0452B3F75F90B91CE82A917D5F1
                                                                                                                                                                                                SHA1:46420ADDFD289063ACEB831F83B42F4FB7EF8262
                                                                                                                                                                                                SHA-256:FAAF5878B5709E1F7C3D80E3F4945A8185151BD975B8C20011BF185A579D4E02
                                                                                                                                                                                                SHA-512:B9A9D0253B651CBF6AB8C25C308A90ED239D8AA7225F56BE5E4ADB1D36C200C466DA6F0BCA8FB5D084D5DF59C5CBF55EA583EAC447F62EC8495C695FE183CA14
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):3592
                                                                                                                                                                                                Entropy (8bit):4.71780114350715
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:0FFC071BC5AF33D2BE224CF147670471
                                                                                                                                                                                                SHA1:5A7FC912A47D0531B2C95BFCB6BEAAA2248E0779
                                                                                                                                                                                                SHA-256:1923EFD4718E21B882410106B6FEF7FA35C3EB2EC3C2338CD8DFF07108F25C1F
                                                                                                                                                                                                SHA-512:205AF4B98312AB012BE7D7C25AC0A6D91D11C77DC3E29A9D6CC80F96A97577826079469AF16F88FE214CF0A17C70261C4AAA671FBB19EF214B91776BC3683353
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://repository.pcapp.store/pcapp/images/front_img/lp/lpd_installing_r2/img/done_cursor_icon.svg
                                                                                                                                                                                                Preview:<svg width="107" height="109" viewBox="0 0 107 109" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_286)"><path d="M78.856 41.614c.048-.048.096-.048.096-.096.048-.048.048-.096.048-.143v-.192c0-.096-.048-.144-.096-.24a.84.84 0 00-.191-.239c-.048-.096-.144-.143-.24-.191-.096-.048-.191-.144-.287-.192L31.16 17.144c-.096-.048-.144-.048-.24-.096S30.777 17 30.68 17h-.574c-.096 0-.144.048-.191.096-.048.048-.096.048-.144.096-.048.047-.048.095-.096.143L28 23.8v.191l7.853 43.29c0 .144.048.24.144.336.048.096.144.191.24.287.095.096.191.192.335.24.096.047.24.143.383.143.048 0 .048 0 .096.048h.622s.048 0 .048-.048c0 0 .048 0 .048-.048h.048s.048 0 .048-.047h.048l.048-.048.047-.048 10.153-14.27L63.1 70.537l.048.048s.048 0 .048.048l.048.048s.048.048.096.048h.096c.047 0 .047.047.095.047s.048.048.096.048h.863c.048 0 .048 0 .096-.047.048 0 .048-.048.096-.048l8.476-5.986 4.214-5.603c.048-.048.048-.096.096-.144 0-.048.047-.096.047-.144v-.191c0-.048-.047-.144-.047-.192a.363.363 0
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:HTML document, ASCII text, with very long lines (22117), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):22117
                                                                                                                                                                                                Entropy (8bit):5.547288449403996
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C5E0BF29762E51CB615A75913DF4B6AF
                                                                                                                                                                                                SHA1:10F2DF163F2DADAC0AC3E91644E9F59ACE5971C0
                                                                                                                                                                                                SHA-256:4F9ECA68BFE3FDA9327F39E226C56496D0BB4747DD27F5EE4C0A97D5DDE13F27
                                                                                                                                                                                                SHA-512:6D55749C240C4C3B48FC35D0E9FFEDB7ECDCE4BD3978D8E7C57FF1FE6523302411B09AA4D10A659DFE8F83618C4B5DCD657F65F511BC560C7AE041390F56AEAC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://td.doubleclick.net/td/rul/858128210?random=1730480725638&cv=11&fst=1730480725638&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dpage_view
                                                                                                                                                                                                Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":5184000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s681066530.1730480726","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s681066530.1730480726\u0026ig_key=1sNHM2ODEwNjY1MzAuMTczMDQ4MDcyNg!2sZ3QkWA!3sAAptDV6m_mLe","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sI9K3Xw!2sZ3QkWA!3sAAptDV6m_mLe"],"userBiddingSignals":[["596093288","7900466892","7904705661","7904283812","7896384790","475816165"],null,1730480728301735],"ads":[{"renderUrl":"https://tdsf.doubleclick.
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (3969)
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):290593
                                                                                                                                                                                                Entropy (8bit):5.559535489184035
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:FAF0B97626C2881F64507F25E6698BA3
                                                                                                                                                                                                SHA1:2665E71576A72F616FDC7E13EC94BCBD14871264
                                                                                                                                                                                                SHA-256:7F59FF06C09A94246B0CF422C42F6BB0B3CBDA1D959789271946556B7EAA1346
                                                                                                                                                                                                SHA-512:B22DFBDBAD389E52D07CBF6DF11E1D4E431198137C7EDE522FF9A0980CE472B993EB928AC3583D769A06E38B83ED1AA73CF3CAB2FCFF9A3A5F92DF986A069556
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"}],. "tags":[{"function":"__ogt_ads_datatos","priority":16,"vtp_instanceDestinationId":"AW-858128210","tag_id":16},{"function":"__ogt_cps","priority":6,"vtp_cpsMode":"ALL","tag_id":8},{"function":"__ogt_1p_data_v2","priority":6,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (3969)
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):290593
                                                                                                                                                                                                Entropy (8bit):5.559451724223082
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:04232381FA93D719737A3FE0895E080F
                                                                                                                                                                                                SHA1:6C4F0C03C27FDC1F750C288472457D426A0CCB89
                                                                                                                                                                                                SHA-256:5C581F33227F839395B3EABC4FFC1750A6C0AA0884C87B2DCE1F2755DD7D93DE
                                                                                                                                                                                                SHA-512:AC7E4B74927A7F88E74DF7867005DF04FE763D072FE562A86A41869C6AE979006070D0CF8041F3A4D5C73E3DB732A829A1605A01AC3C4A4EEDC9181F1CFB0672
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://www.googletagmanager.com/gtag/js?id=AW-858128210
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"}],. "tags":[{"function":"__ogt_ads_datatos","priority":16,"vtp_instanceDestinationId":"AW-858128210","tag_id":16},{"function":"__ogt_cps","priority":6,"vtp_cpsMode":"ALL","tag_id":8},{"function":"__ogt_1p_data_v2","priority":6,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3592
                                                                                                                                                                                                Entropy (8bit):4.71780114350715
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:0FFC071BC5AF33D2BE224CF147670471
                                                                                                                                                                                                SHA1:5A7FC912A47D0531B2C95BFCB6BEAAA2248E0779
                                                                                                                                                                                                SHA-256:1923EFD4718E21B882410106B6FEF7FA35C3EB2EC3C2338CD8DFF07108F25C1F
                                                                                                                                                                                                SHA-512:205AF4B98312AB012BE7D7C25AC0A6D91D11C77DC3E29A9D6CC80F96A97577826079469AF16F88FE214CF0A17C70261C4AAA671FBB19EF214B91776BC3683353
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="107" height="109" viewBox="0 0 107 109" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_286)"><path d="M78.856 41.614c.048-.048.096-.048.096-.096.048-.048.048-.096.048-.143v-.192c0-.096-.048-.144-.096-.24a.84.84 0 00-.191-.239c-.048-.096-.144-.143-.24-.191-.096-.048-.191-.144-.287-.192L31.16 17.144c-.096-.048-.144-.048-.24-.096S30.777 17 30.68 17h-.574c-.096 0-.144.048-.191.096-.048.048-.096.048-.144.096-.048.047-.048.095-.096.143L28 23.8v.191l7.853 43.29c0 .144.048.24.144.336.048.096.144.191.24.287.095.096.191.192.335.24.096.047.24.143.383.143.048 0 .048 0 .096.048h.622s.048 0 .048-.048c0 0 .048 0 .048-.048h.048s.048 0 .048-.047h.048l.048-.048.047-.048 10.153-14.27L63.1 70.537l.048.048s.048 0 .048.048l.048.048s.048.048.096.048h.096c.047 0 .047.047.095.047s.048.048.096.048h.863c.048 0 .048 0 .096-.047.048 0 .048-.048.096-.048l8.476-5.986 4.214-5.603c.048-.048.048-.096.096-.144 0-.048.047-.096.047-.144v-.191c0-.048-.047-.144-.047-.192a.363.363 0
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):438989
                                                                                                                                                                                                Entropy (8bit):5.626554013956811
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:18A284711294A752E1F6D3A6CC1DE875
                                                                                                                                                                                                SHA1:F2C89284E5BBF6A0EE199DC5CDDEA3078F84AF81
                                                                                                                                                                                                SHA-256:4CDABEE20D714E07D18E64C749D9A902515BA060B2C970CB2E3C2F02221A7FA4
                                                                                                                                                                                                SHA-512:A638854E3E75AC8BAB952AC04D8BB99EFD91A603EA7F653BA440D58FF858449FEA91B2BB6567B81258FCBAD0FC56A1F2B7DC4509CBDB8EC5ADC056CC6EF7CCBC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://www.googletagmanager.com/gtag/js?id=G-VFQWFX3X1C&l=dataLayer&cx=c
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:Web Open Font Format (Version 2), TrueType, length 48444, version 1.0
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):48444
                                                                                                                                                                                                Entropy (8bit):7.995593685409469
                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:8E433C0592F77BEB6DC527D7B90BE120
                                                                                                                                                                                                SHA1:D7402416753AE1BB4CBD4B10D33A0C10517838BD
                                                                                                                                                                                                SHA-256:F052EE44C3728DFD23ABA8A4567150BC314D23903026FBB6AD089422C2DF56AF
                                                                                                                                                                                                SHA-512:5E90F48B923BB95AEB49691D03DADE8825C119B2FA28977EA170C41548900F4E0165E2869F97C7A9380D7FF8FF331A1DA855500E5F7B0DFD2B9ABD77A386BBF3
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa1ZL7.woff2
                                                                                                                                                                                                Preview:wOF2.......<.......l..............................`...\..p?HVAR.m?MVAR^.`?STAT.N'&..>/l........>....0....6.$.... ........[..A.2v.6......$..e...w"../.L.p:......Tpc..8@.[5......d#d.xw..o.O3-.....%..>...%..)~p.K.J.H..S...s..z..Wa.. 0\..J.....BL;V..-.L...j....^.9..HO l..,.*.6.v....?....x.....m..;....a![zif...Ur...Q..P.&.I1..:n.p...j~..h...9.!....@.<.bl|.Y?h..B.j/..rH.S%/~.^D...6..D.4G...y....Y.....=/o..W..5ryo.d?.gA]..?...1V..S......7ZJ...f....mBG[0eW....y..%B}..]? ...,sR<.y~.~.}.%.!..,X.....`...R..^....S.....u*.?k.v.k..U.u..M..`!...b!..X)P...y{.........n..T+6...R......L...x}...g...].g"WT.b..h ....X...=;{w...QO.s..w..@.(,..........{.........1..@...(...\.......9*..2.h9P.G........K.Dp...F..4W..ui.u...G...s..x7.?..tg..D..O.sA..t.t.4..~..e\...X.....T..kf.qfX..=^_....g"....De...x[J..A..).G.YUhR.....0.l..#&3.'.K..*...........$I.Pp.../.s.<@...r=..S......d..P.S.B.w.~X..ZK....h J.`A.bv,=.....>1.Ev.^..U.A. ....EU..].........dw..!$.A`..B.._.....Z~..!..J..l]r.m}m..
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:HTML document, ASCII text, with very long lines (22131), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):22131
                                                                                                                                                                                                Entropy (8bit):5.547458489815226
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:10F66CE061CDC19F2C039A5E04CADC8C
                                                                                                                                                                                                SHA1:54959BBE0CCBD39DB4A22E666471A526DC771B6F
                                                                                                                                                                                                SHA-256:AF0531BC207DA49852DA9966F276A68A84E5B04964C05EC1A53359A6B86C52B2
                                                                                                                                                                                                SHA-512:ADB8CC4E939DC5AE9D1F80BDD523013610C38B30AA2FACD6A8C4C911B98B948E0F49AB989ED8EB73421BE4F5DCDA40DB11634028072596D770ED7E85EE2C977C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://td.doubleclick.net/td/rul/858128210?random=1730480726201&cv=11&fst=1730480726201&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&label=kTaFCIuq0YYZENL-l5kD&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&value=1&currency_code=USD&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dconversion
                                                                                                                                                                                                Preview:<html><head><meta http-equiv="origin-trial" content="Avh5Ny0XEFCyQ7+oNieXskUrqY8edUzL5/XrwKlGjARQHW4TFRK+jVd5HnDIpY20n5OLHfgU4ku7x48N3uhG/A0AAABxeyJvcmlnaW4iOiJodHRwczovL2RvdWJsZWNsaWNrLm5ldDo0NDMiLCJmZWF0dXJlIjoiUHJpdmFjeVNhbmRib3hBZHNBUElzIiwiZXhwaXJ5IjoxNjk1MTY3OTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="></head><body><script>var ig_list={"interestGroups":[{"action":0,"expirationTimeInSeconds":31104000,"interestGroupAttributes":{"owner":"https://td.doubleclick.net","name":"4s681066530.1730480726","biddingLogicUrl":"https://td.doubleclick.net/td/bjs","dailyUpdateUrl":"https://td.doubleclick.net/td/update?ig_name=4s681066530.1730480726\u0026ig_key=1sNHM2ODEwNjY1MzAuMTczMDQ4MDcyNg!2saP-mWA!3sAAptDV5jP3xv","trustedBiddingSignalsUrl":"https://td.doubleclick.net/td/bts","trustedBiddingSignalsKeys":["1sI9K3Xw!2saP-mWA!3sAAptDV5jP3xv"],"userBiddingSignals":[["475816165","596093288","8552333481","7904283812","7904705661","7900466892","7896384790"],null,1730480728482511],"ads":[{"renderUrl":"https://tds
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):2118
                                                                                                                                                                                                Entropy (8bit):4.907323279161229
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:1039640CF0666A1621D55C9E9FA81439
                                                                                                                                                                                                SHA1:A7E6A6AB233DAE1776506F2E6C7FD03E46E83EA9
                                                                                                                                                                                                SHA-256:4455C2A26901C4D348E194B06B06908C155E6459CF5987984D03848E30964F0C
                                                                                                                                                                                                SHA-512:F9324B6C58C51DC3F24BD242EADA7E5565B60E12863EC13F28D883028791AEC7EC5E324298FA0427AD1CD45BDD7260FF0295DC171F24DD0AC3F0203FB6CD0706
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:<svg width="132" height="132" viewBox="0 0 132 132" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_279)"><path d="M16 12.5A4.5 4.5 0 0120.5 8h91a4.5 4.5 0 014.5 4.5v91a4.5 4.5 0 01-4.5 4.5h-91a4.5 4.5 0 01-4.5-4.5v-91z" fill="#fff"/></g><path d="M81.894 54.233H67.64c-.913 0-.913 0-.913-.865V32.733c0-.865 0-.845.85-.966 3.341-.463 6.661-.946 10.002-1.41 3.839-.543 7.657-1.066 11.496-1.59 2.345-.322 4.69-.664 7.014-.986 1.037-.14 1.037-.14 1.037.866v24.6c0 .986 0 .986-1.016.986H81.894zm.021 5.841h14.422c.767 0 .767 0 .767.765v24.963c0 .845 0 .865-.871.745-3.32-.463-6.64-.947-9.94-1.41-2.282-.322-4.586-.624-6.868-.946-2.801-.382-5.603-.785-8.404-1.187-1.204-.161-2.386-.363-3.59-.484-.54-.06-.705-.261-.705-.764.02-4.067.02-8.113.02-12.18v-8.898c0-.463.146-.604.623-.604 4.814.02 9.69 0 14.546 0zm-34.175.001h12.243c.705 0 .705 0 .705.704v19.669c0 .825-.041.825-.892.704-2.47-.342-4.918-.684-7.387-1.026-2.158-.303-4.316-.625-6.454-.927-2.448-.342-4.897-.664-7.345-
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4979), with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4979
                                                                                                                                                                                                Entropy (8bit):5.863757518720551
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:11CC78FAD13D38EF106753F90B179381
                                                                                                                                                                                                SHA1:6AD9F8D1C432D20996B6CEA380A76F112BEBDD18
                                                                                                                                                                                                SHA-256:7AA48B0E80DADE9719831B1DC516DADEB66A1EB49686059D3C43E18964C265C2
                                                                                                                                                                                                SHA-512:1D2FC53A0C5BADA28EA647A2B08585FB3F0A2C2C5DE15C8471C366795CF449681C69649480B81F1F4ECFC8008B23D083EE620563F3E888EA48F3C4239EC83EFF
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4864), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):4864
                                                                                                                                                                                                Entropy (8bit):5.841596502908707
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:3610EADCFBCC8EFEE635D8B882697596
                                                                                                                                                                                                SHA1:54FA3DBF7AE6155FD0152D495367618DE89C8B7A
                                                                                                                                                                                                SHA-256:6790ADFEC86F01691E9042EF72300AFD1B01FAC7EC118FD25F6A3ABB2BDB822C
                                                                                                                                                                                                SHA-512:03A54BC290FE457292774EC566DA2F021759F6A553642868BECBB035C7542EAC120489391EA2932AFDE053004A4BC3FB08725304DB7DFDF2B1BC984BCA4C2008
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480725597&cv=11&fst=1730480725597&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config&rfmt=3&fmt=4
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):2499
                                                                                                                                                                                                Entropy (8bit):5.4636477793325495
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:382991778933FB8F5697DEB2EE26A0ED
                                                                                                                                                                                                SHA1:6CDED0C76F01EA3C3C6DB8128B5CF59063A92C78
                                                                                                                                                                                                SHA-256:0919FF36779EEF85FA50AF4B94FB2D496A765612B7C5EDD31BA69EA1F4136736
                                                                                                                                                                                                SHA-512:FC05BAFD9EB747B7060B8C730E8A467CFD0A0311622B325E5EB74A1083D3A7B8897396CF4FE310E7567EAA1B5A951AB3906F57E57671F2852A18ED1AD0E7E2C9
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://fonts.googleapis.com/css2?family=Inter:wght@100..900&display=swap
                                                                                                                                                                                                Preview:/* cyrillic-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2JL7SUc.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C8A, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa0ZL7SUc.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2ZL7SUc.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100 900;. f
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4880), with no line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4880
                                                                                                                                                                                                Entropy (8bit):5.842926593121028
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:2331ED1201F9FA1A1301648FF5E897FC
                                                                                                                                                                                                SHA1:129B6B6D15B556D878F733ED8D111845BBCE43C0
                                                                                                                                                                                                SHA-256:68F9E248B0750A71D9192317C03C32B6E36C599736B83333EF76250DDE723E00
                                                                                                                                                                                                SHA-512:26C622861BE98BEE4AF7A7554813BBF8098FEF913C4214464C29235801594B866E63650E6AC408110C467DD5B9A63FDAD6079959CAB4A5D4E15933A3B0EF4483
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:HTML document, ASCII text, with very long lines (815)
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):3501
                                                                                                                                                                                                Entropy (8bit):5.383873370647921
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:147FD3B00C22BA9C939712E9213C24CA
                                                                                                                                                                                                SHA1:3B48369B86FA0574F35379AACD1F42CC9C98A52B
                                                                                                                                                                                                SHA-256:70F5B11C1870CF90201A6D5F770CA318A3FA5827C74A8765EDE22B487F7D4532
                                                                                                                                                                                                SHA-512:E8419A71232EDAC8FD131446777F7D034B3171EFE07B3267479B439E4982650DB65A0D1DDC9F516315D5ED1B01ECFD2F7EB55D75D44AA51EE0AD494D441586D2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://www.googletagmanager.com/static/service_worker/4al0/sw_iframe.html?origin=https%3A%2F%2Fpcapp.store
                                                                                                                                                                                                Preview:<!DOCTYPE html>.<html>.<head>. <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon">.</head>.<body>. <script>.'use strict';class m{constructor(a){this.j=a;this.g={};this.h={};this.i=0;this.id=String(Math.floor(Number.MAX_SAFE_INTEGER*Math.random()))}}function n(a){return a.performance&&a.performance.now()||Date.now()}.var p=function(a,b){class d{constructor(c,g,f){this.failureType=c;this.data=g;this.g=f;this.h=new m(n(f))}s(c,g){const f=c.clientId;if(c.type===0){c.isDead=!0;var e=this.h,h=n(this.g);e.g[f]==null&&(e.g[f]=0,e.h[f]=h,e.i++);e.g[f]++;c.stats={targetId:e.id,clientCount:e.i,totalLifeMs:Math.round(h-e.j),heartbeatCount:e.g[f],clientLifeMs:Math.round(h-e.h[f])}}c.failure={failureType:this.failureType,data:this.data};g(c)}}return new d(5,a,b)};/*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/.let q=globalThis.trustedTypes,r;function t(){let a=null;if(!q)return a;try{const b=d=>d;a=q.createPolicy("goog#html",{createHTML:b,createScript:b,crea
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (14408)
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):438963
                                                                                                                                                                                                Entropy (8bit):5.626425939314671
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:DCC29C0229BBEC80CCFC225904DEC5A2
                                                                                                                                                                                                SHA1:266FCC664BD11BF8435890995437FF1C2AD904BB
                                                                                                                                                                                                SHA-256:27ED689530124DAAB62A550B402056EF04BA693DC205711F362FA59BA96E2DDC
                                                                                                                                                                                                SHA-512:D43A0612D9421EE5208AA81CB1031C4EE4D7175632D15933DD5B66E3E27D98AECF2B2D47A9D79A6D7F343467C23D60E5F751649E757497F47AD6E2616E24EFE8
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"3",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_cross_domain","priority":39,"vtp_rules":["list","pcapp\\.store","pcappstore\\.download"],"tag_id":11},{"function":"__ogt_ga_send","priority":29,"vtp_value":true,"tag_id":13},{"function":"__ogt_referral_exclusion","priority":29,"vtp_includeConditions":["list","veryfast\\.io"],"tag_id":14},{"function":"__ogt_session_timeout","priority":29,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":15},{"function":"__ogt_1p_data_v2","priority":29,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionTy
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:HTML document, ASCII text, with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):13
                                                                                                                                                                                                Entropy (8bit):2.7773627950641693
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C83301425B2AD1D496473A5FF3D9ECCA
                                                                                                                                                                                                SHA1:941EFB7368E46B27B937D34B07FC4D41DA01B002
                                                                                                                                                                                                SHA-256:B633A587C652D02386C4F16F8C6F6AAB7352D97F16367C3C40576214372DD628
                                                                                                                                                                                                SHA-512:83BAFE4C888008AFDD1B72C028C7F50DEE651CA9E7D8E1B332E0BF3AA1315884155A1458A304F6E5C5627E714BF5A855A8B8D7DB3F4EB2BB2789FE2F8F6A1D83
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://td.doubleclick.net/td/ga/rul?tid=G-VFQWFX3X1C&gacid=1295164978.1730480726&gtm=45je4au0v898645365za200zb9103256652&dma=0&gcd=13l3l3l3l1l1&npa=0&pscdl=noapi&aip=1&fledge=1&frm=0&tag_exp=101533422~101823848~101878899~101878944~101925629&z=581400525
                                                                                                                                                                                                Preview:<html></html>
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (4961), with no line terminators
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):4961
                                                                                                                                                                                                Entropy (8bit):5.854152209992925
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:C9382F98CC2DA690AF52DA5B9AA3161B
                                                                                                                                                                                                SHA1:50DCB05B21C92341E0B257073A51875BAD4A044C
                                                                                                                                                                                                SHA-256:69D81C786D412D63524290A0523B9D95891D4FC0545263753E28CD272B34D235
                                                                                                                                                                                                SHA-512:C69BC682080C1721BC3244112DC1A9F9917025DF1832098B8564B56867557EA04AE0502F3BBC5608DCDFEDB41B8AD6B2C8EFCBD728A4A772AA8804CE1C99A701
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730480726201&cv=11&fst=1730480726201&bg=ffffff&guid=ON&async=1&gtm=45be4au0v9103256652za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101533422~101823848~101878899~101878944~101925629&u_w=1280&u_h=1024&url=https%3A%2F%2Fpcapp.store%2F%3Fp%3Dlpd_installing_r2%26guid%3D4D802742-3099-9C0E-C19B-2A23EA1FC420%26_fcid%3D1728941759157143%26_winver%3D19045%26version%3Dfa.1091y&label=kTaFCIuq0YYZENL-l5kD&hn=www.googleadservices.com&frm=0&tiba=APP%20STORE%3A%20Installing&value=1&currency_code=USD&npa=0&pscdl=noapi&auid=681066530.1730480726&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.134%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.134&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dconversion&rfmt=3&fmt=4
                                                                                                                                                                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,d){if(a==Array.prototype||a==Object.prototype)return a;a[b]=d.value;return a};function k(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var d=a[b];if(d&&d.Math==Math)return d}throw Error("Cannot find global object");} var m=k(this),p=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",t={},v={};function w(a,b,d){if(!d||a!=null){d=v[b];if(d==null)return a[b];d=a[d];return d!==void 0?d:a[b]}} function x(a,b,d){if(b)a:{var c=a.split(".");a=c.length===1;var e=c[0],g;!a&&e in t?g=t:g=m;for(e=0;e<c.length-1;e++){var f=c[e];if(!(f in g))break a;g=g[f]}c=c[c.length-1];d=p&&d==="es6"?g[c]:null;b=b(d);b!=null&&(a?h(t,c,{configurable:!0,writable:!0,value:b}):b!==d&&(v[c]===void 0&&(a=Math.random()*1E9>>>0,v[c]=p?m.Symbol(c):"$jscp$"+a+"$"+c),h(g,v[c],{co
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (723)
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):7076
                                                                                                                                                                                                Entropy (8bit):5.52488676121649
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:88A2E0A522036C0B87E03552E56629AA
                                                                                                                                                                                                SHA1:EC9D1157518E753A84DBDE1333A29B34CF776D63
                                                                                                                                                                                                SHA-256:788AFB96F2DA68E8729EC35F3D5E381FAD3482D37C54C2195C7311440EE4C27E
                                                                                                                                                                                                SHA-512:44B953878BD650FE2BCC8B6904620955C3E396B7DC8F41F85D021A8E0404DA41DB15C5499A03F7D4FE9129BB340AA3F6782942CF5327502FD4569BEBBB17073F
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://www.googletagmanager.com/static/service_worker/4al0/sw.js?origin=https%3A%2F%2Fpcapp.store
                                                                                                                                                                                                Preview:'use strict';var k=function(a){function b(c){return a.next(c)}function e(c){return a.throw(c)}return new Promise(function(c,d){function f(h){h.done?c(h.value):Promise.resolve(h.value).then(b,e).then(f,d)}f(a.next())})};/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var m=this||self;var u,v;a:{for(var x=["CLOSURE_FLAGS"],B=m,C=0;C<x.length;C++)if(B=B[x[C]],B==null){v=null;break a}v=B}var G=v&&v[610401301];u=G!=null?G:!1;var H;const I=m.navigator;H=I?I.userAgentData||null:null;function J(a){return u?H?H.brands.some(({brand:b})=>b&&b.indexOf(a)!=-1):!1:!1}function K(a){var b;a:{const e=m.navigator;if(e){const c=e.userAgent;if(c){b=c;break a}}b=""}return b.indexOf(a)!=-1};function L(){return u?!!H&&H.brands.length>0:!1}function O(){return L()?J("Chromium"):(K("Chrome")||K("CriOS"))&&!(L()?0:K("Edge"))||K("Silk")};!K("Android")||O();O();!K("Safari")||O()||(L()?0:K("Coast"))||(L()?0:K("Opera"))||(L()?0:K("Edge"))||(L()?J("Microsoft Edge"):K("Edg/"))||L()&
                                                                                                                                                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                File Type:SVG Scalable Vector Graphics image
                                                                                                                                                                                                Category:downloaded
                                                                                                                                                                                                Size (bytes):2118
                                                                                                                                                                                                Entropy (8bit):4.907323279161229
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:
                                                                                                                                                                                                MD5:1039640CF0666A1621D55C9E9FA81439
                                                                                                                                                                                                SHA1:A7E6A6AB233DAE1776506F2E6C7FD03E46E83EA9
                                                                                                                                                                                                SHA-256:4455C2A26901C4D348E194B06B06908C155E6459CF5987984D03848E30964F0C
                                                                                                                                                                                                SHA-512:F9324B6C58C51DC3F24BD242EADA7E5565B60E12863EC13F28D883028791AEC7EC5E324298FA0427AD1CD45BDD7260FF0295DC171F24DD0AC3F0203FB6CD0706
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                URL:https://repository.pcapp.store/pcapp/images/front_img/lp/lpd_installing_r2/img/done_windows_icon.svg
                                                                                                                                                                                                Preview:<svg width="132" height="132" viewBox="0 0 132 132" fill="none" xmlns="http://www.w3.org/2000/svg"><g filter="url(#filter0_d_539_279)"><path d="M16 12.5A4.5 4.5 0 0120.5 8h91a4.5 4.5 0 014.5 4.5v91a4.5 4.5 0 01-4.5 4.5h-91a4.5 4.5 0 01-4.5-4.5v-91z" fill="#fff"/></g><path d="M81.894 54.233H67.64c-.913 0-.913 0-.913-.865V32.733c0-.865 0-.845.85-.966 3.341-.463 6.661-.946 10.002-1.41 3.839-.543 7.657-1.066 11.496-1.59 2.345-.322 4.69-.664 7.014-.986 1.037-.14 1.037-.14 1.037.866v24.6c0 .986 0 .986-1.016.986H81.894zm.021 5.841h14.422c.767 0 .767 0 .767.765v24.963c0 .845 0 .865-.871.745-3.32-.463-6.64-.947-9.94-1.41-2.282-.322-4.586-.624-6.868-.946-2.801-.382-5.603-.785-8.404-1.187-1.204-.161-2.386-.363-3.59-.484-.54-.06-.705-.261-.705-.764.02-4.067.02-8.113.02-12.18v-8.898c0-.463.146-.604.623-.604 4.814.02 9.69 0 14.546 0zm-34.175.001h12.243c.705 0 .705 0 .705.704v19.669c0 .825-.041.825-.892.704-2.47-.342-4.918-.684-7.387-1.026-2.158-.303-4.316-.625-6.454-.927-2.448-.342-4.897-.664-7.345-
                                                                                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                Entropy (8bit):7.612503435311638
                                                                                                                                                                                                TrID:
                                                                                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                File name:Setup.exe
                                                                                                                                                                                                File size:190'056 bytes
                                                                                                                                                                                                MD5:9aa62835585485a40e45b2ae935c42b0
                                                                                                                                                                                                SHA1:208bad1614fd19318aadce03531713a2ad885cd8
                                                                                                                                                                                                SHA256:d28331e98edccdfb2709fc1af526c0cec059a6d008e54a537ce1e10a32c876be
                                                                                                                                                                                                SHA512:df77b384c0c3f4830a81e01efd09047082c1db6f6555303e8f15947b550eef6c8b750fb4e0fc416086b9198e31bf4ecacb214cca6f8d51f9b1b7f8c36ca759fd
                                                                                                                                                                                                SSDEEP:3072:5bG7N2kDTHUpou+yVgEPzy5n+/mGCK8izuG2okB2h4l591BBgk+URHq:5bE/HUWmgEry5nmQiiGz4z9TJzRK
                                                                                                                                                                                                TLSH:2804F1A056E0C862D4A28B71B5797F7B8AB6DC2166718B8313407B187A7DF819F0D373
                                                                                                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                                                                                                                                                                                                Icon Hash:45d44c7192498005
                                                                                                                                                                                                Entrypoint:0x40352d
                                                                                                                                                                                                Entrypoint Section:.text
                                                                                                                                                                                                Digitally signed:true
                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                Subsystem:windows gui
                                                                                                                                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                                                                                                                                                                                                TLS Callbacks:
                                                                                                                                                                                                CLR (.Net) Version:
                                                                                                                                                                                                OS Version Major:4
                                                                                                                                                                                                OS Version Minor:0
                                                                                                                                                                                                File Version Major:4
                                                                                                                                                                                                File Version Minor:0
                                                                                                                                                                                                Subsystem Version Major:4
                                                                                                                                                                                                Subsystem Version Minor:0
                                                                                                                                                                                                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                                                                                                                                                                                                Signature Valid:true
                                                                                                                                                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                                                                                                                Signature Validation Error:The operation completed successfully
                                                                                                                                                                                                Error Number:0
                                                                                                                                                                                                Not Before, Not After
                                                                                                                                                                                                • 08/05/2024 02:00:00 14/02/2025 00:59:59
                                                                                                                                                                                                Subject Chain
                                                                                                                                                                                                • CN=FAST CORPORATION LTD, O=FAST CORPORATION LTD, L=Ra'anana, C=IL, SERIALNUMBER=515636181, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=IL
                                                                                                                                                                                                Version:3
                                                                                                                                                                                                Thumbprint MD5:04786BD703B906E22AECB2AD38CE4D94
                                                                                                                                                                                                Thumbprint SHA-1:07BE42727905BE32C822A638502C1B8FAAE6540A
                                                                                                                                                                                                Thumbprint SHA-256:FDB017BB88E5D453E22A73810690C72534F58EFB109EA0D4494EC393F2307DBC
                                                                                                                                                                                                Serial:0E5C655E1CBE9A8879372F58A5BC0302
                                                                                                                                                                                                Instruction
                                                                                                                                                                                                push ebp
                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                sub esp, 000003F4h
                                                                                                                                                                                                push ebx
                                                                                                                                                                                                push esi
                                                                                                                                                                                                push edi
                                                                                                                                                                                                push 00000020h
                                                                                                                                                                                                pop edi
                                                                                                                                                                                                xor ebx, ebx
                                                                                                                                                                                                push 00008001h
                                                                                                                                                                                                mov dword ptr [ebp-14h], ebx
                                                                                                                                                                                                mov dword ptr [ebp-04h], 0040A2E0h
                                                                                                                                                                                                mov dword ptr [ebp-10h], ebx
                                                                                                                                                                                                call dword ptr [004080CCh]
                                                                                                                                                                                                mov esi, dword ptr [004080D0h]
                                                                                                                                                                                                lea eax, dword ptr [ebp-00000140h]
                                                                                                                                                                                                push eax
                                                                                                                                                                                                mov dword ptr [ebp-0000012Ch], ebx
                                                                                                                                                                                                mov dword ptr [ebp-2Ch], ebx
                                                                                                                                                                                                mov dword ptr [ebp-28h], ebx
                                                                                                                                                                                                mov dword ptr [ebp-00000140h], 0000011Ch
                                                                                                                                                                                                call esi
                                                                                                                                                                                                test eax, eax
                                                                                                                                                                                                jne 00007F87B8CC603Ah
                                                                                                                                                                                                lea eax, dword ptr [ebp-00000140h]
                                                                                                                                                                                                mov dword ptr [ebp-00000140h], 00000114h
                                                                                                                                                                                                push eax
                                                                                                                                                                                                call esi
                                                                                                                                                                                                mov ax, word ptr [ebp-0000012Ch]
                                                                                                                                                                                                mov ecx, dword ptr [ebp-00000112h]
                                                                                                                                                                                                sub ax, 00000053h
                                                                                                                                                                                                add ecx, FFFFFFD0h
                                                                                                                                                                                                neg ax
                                                                                                                                                                                                sbb eax, eax
                                                                                                                                                                                                mov byte ptr [ebp-26h], 00000004h
                                                                                                                                                                                                not eax
                                                                                                                                                                                                and eax, ecx
                                                                                                                                                                                                mov word ptr [ebp-2Ch], ax
                                                                                                                                                                                                cmp dword ptr [ebp-0000013Ch], 0Ah
                                                                                                                                                                                                jnc 00007F87B8CC600Ah
                                                                                                                                                                                                and word ptr [ebp-00000132h], 0000h
                                                                                                                                                                                                mov eax, dword ptr [ebp-00000134h]
                                                                                                                                                                                                movzx ecx, byte ptr [ebp-00000138h]
                                                                                                                                                                                                mov dword ptr [00434FB8h], eax
                                                                                                                                                                                                xor eax, eax
                                                                                                                                                                                                mov ah, byte ptr [ebp-0000013Ch]
                                                                                                                                                                                                movzx eax, ax
                                                                                                                                                                                                or eax, ecx
                                                                                                                                                                                                xor ecx, ecx
                                                                                                                                                                                                mov ch, byte ptr [ebp-2Ch]
                                                                                                                                                                                                movzx ecx, cx
                                                                                                                                                                                                shl eax, 10h
                                                                                                                                                                                                or eax, ecx
                                                                                                                                                                                                Programming Language:
                                                                                                                                                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x4f40.rsrc
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x2bd000x2968.data
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                .text0x10000x68970x6a00ce9df19df15aa7bfbc0a8d0af0b841d0False0.6661261792452831data6.458398214928006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                .rdata0x80000x14a60x1600a118375c929d970903c1204233b7583dFalse0.4392755681818182data5.024109281264143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                .data0xa0000x2b0180x60082a10c59a8679bb952fc8316070b8a6cFalse0.521484375data4.15458210408643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                .ndata0x360000x360000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                .rsrc0x6c0000x4f400x5000d386db4207d98e431afac61b9665d161False0.101513671875data2.7607791700397164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                RT_ICON0x6c2080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/mEnglishUnited States0.036372224846480866
                                                                                                                                                                                                RT_DIALOG0x704300x202dataEnglishUnited States0.4085603112840467
                                                                                                                                                                                                RT_DIALOG0x706380xf8dataEnglishUnited States0.6290322580645161
                                                                                                                                                                                                RT_DIALOG0x707300xa0dataEnglishUnited States0.60625
                                                                                                                                                                                                RT_DIALOG0x707d00xeedataEnglishUnited States0.6302521008403361
                                                                                                                                                                                                RT_GROUP_ICON0x708c00x14dataEnglishUnited States1.1
                                                                                                                                                                                                RT_VERSION0x708d80x240dataEnglishUnited States0.4878472222222222
                                                                                                                                                                                                RT_MANIFEST0x70b180x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States0.5127478753541076
                                                                                                                                                                                                DLLImport
                                                                                                                                                                                                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                                                                                                                                                                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                                                                                                                                                                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                                                                                                                                                                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                                                                                                                                                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                                                                                                                                                                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                                                                                                                                                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                                                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                EnglishUnited States
                                                                                                                                                                                                Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Target ID:0
                                                                                                                                                                                                Start time:13:05:12
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Users\user\Desktop\Setup.exe"
                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                File size:190'056 bytes
                                                                                                                                                                                                MD5 hash:9AA62835585485A40E45B2AE935C42B0
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:3
                                                                                                                                                                                                Start time:13:05:19
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=4D802742-3099-9C0E-C19B-2A23EA1FC420&winver=19045&version=fa.1091y&nocache=20241101130519.339&_fcid=1728941759157143
                                                                                                                                                                                                Imagebase:0x7ff684c40000
                                                                                                                                                                                                File size:3'242'272 bytes
                                                                                                                                                                                                MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:5
                                                                                                                                                                                                Start time:13:05:20
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                                                                                                                                Imagebase:0x7ff684c40000
                                                                                                                                                                                                File size:3'242'272 bytes
                                                                                                                                                                                                MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:6
                                                                                                                                                                                                Start time:13:05:25
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                                                                                                                                Imagebase:0x7ff684c40000
                                                                                                                                                                                                File size:3'242'272 bytes
                                                                                                                                                                                                MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:7
                                                                                                                                                                                                Start time:13:05:25
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2396,i,9363500844381799255,4111926707263631247,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                                                                                                                                Imagebase:0x7ff684c40000
                                                                                                                                                                                                File size:3'242'272 bytes
                                                                                                                                                                                                MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:9
                                                                                                                                                                                                Start time:13:05:38
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\nspF85F.tmp
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force
                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                File size:93'438'040 bytes
                                                                                                                                                                                                MD5 hash:C50F23A6E99F3FAEC7A10CEB1884F73E
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Antivirus matches:
                                                                                                                                                                                                • Detection: 21%, ReversingLabs
                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:11
                                                                                                                                                                                                Start time:13:06:17
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\PCAppStore\PcAppStore.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Users\user\PCAppStore\PcAppStore.exe" /init default
                                                                                                                                                                                                Imagebase:0x7ff6ed860000
                                                                                                                                                                                                File size:3'119'448 bytes
                                                                                                                                                                                                MD5 hash:102313158837DA34ECE7FBE599A0EEC5
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Antivirus matches:
                                                                                                                                                                                                • Detection: 3%, ReversingLabs
                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:12
                                                                                                                                                                                                Start time:13:06:17
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\PCAppStore\Watchdog.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Users\user\PCAppStore\Watchdog.exe" /guid=4D802742-3099-9C0E-C19B-2A23EA1FC420 /rid=20241101130617.6115035937 /ver=fa.1091y
                                                                                                                                                                                                Imagebase:0x7ff67fe80000
                                                                                                                                                                                                File size:276'312 bytes
                                                                                                                                                                                                MD5 hash:3141E8E75FE71E17B1337CB97B37AB03
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Antivirus matches:
                                                                                                                                                                                                • Detection: 8%, ReversingLabs
                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:13
                                                                                                                                                                                                Start time:13:06:18
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\explorer.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\Explorer.EXE
                                                                                                                                                                                                Imagebase:0x7ff609140000
                                                                                                                                                                                                File size:5'141'208 bytes
                                                                                                                                                                                                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:15
                                                                                                                                                                                                Start time:13:06:25
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:17
                                                                                                                                                                                                Start time:13:06:25
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:18
                                                                                                                                                                                                Start time:13:06:25
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:19
                                                                                                                                                                                                Start time:13:06:26
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:20
                                                                                                                                                                                                Start time:13:06:26
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:21
                                                                                                                                                                                                Start time:13:06:27
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:22
                                                                                                                                                                                                Start time:13:06:27
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\PCAppStore\PcAppStore.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Users\user\PCAppStore\PCAppStore.exe" /init default
                                                                                                                                                                                                Imagebase:0x7ff6ed860000
                                                                                                                                                                                                File size:3'119'448 bytes
                                                                                                                                                                                                MD5 hash:102313158837DA34ECE7FBE599A0EEC5
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:23
                                                                                                                                                                                                Start time:13:06:29
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:24
                                                                                                                                                                                                Start time:13:06:30
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:25
                                                                                                                                                                                                Start time:13:06:31
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:26
                                                                                                                                                                                                Start time:13:06:32
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:27
                                                                                                                                                                                                Start time:13:06:32
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:28
                                                                                                                                                                                                Start time:13:06:32
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:29
                                                                                                                                                                                                Start time:13:06:32
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:30
                                                                                                                                                                                                Start time:13:06:33
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:31
                                                                                                                                                                                                Start time:13:06:33
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:32
                                                                                                                                                                                                Start time:13:06:33
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:33
                                                                                                                                                                                                Start time:13:06:33
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:34
                                                                                                                                                                                                Start time:13:06:33
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:35
                                                                                                                                                                                                Start time:13:06:34
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:36
                                                                                                                                                                                                Start time:13:06:34
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:37
                                                                                                                                                                                                Start time:13:06:34
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:38
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:39
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:40
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:41
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:42
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Program Files (x86)\UVDOoCFyCVqMDYoJXUnLungOKsWoYgmBuYYHXyGubhKwtVsmiLnEJpvwSLzHARWaPQDYlNlJliRDTcoj\qUkmMBjREGieFqRs.exe"
                                                                                                                                                                                                Imagebase:0x1d0000
                                                                                                                                                                                                File size:140'800 bytes
                                                                                                                                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:43
                                                                                                                                                                                                Start time:13:06:35
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\PCAppStore\AutoUpdater.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Users\user\PCAppStore\AutoUpdater.exe" /i
                                                                                                                                                                                                Imagebase:0x7ff6e3760000
                                                                                                                                                                                                File size:586'072 bytes
                                                                                                                                                                                                MD5 hash:4B8501CCF1EB44EA96A20547D4EBE7D3
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Antivirus matches:
                                                                                                                                                                                                • Detection: 5%, ReversingLabs
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Reset < >

                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                  Execution Coverage:28.9%
                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                  Signature Coverage:16.6%
                                                                                                                                                                                                  Total number of Nodes:1349
                                                                                                                                                                                                  Total number of Limit Nodes:40
                                                                                                                                                                                                  execution_graph 2924 4015c1 2943 402da6 2924->2943 2928 401631 2930 401663 2928->2930 2931 401636 2928->2931 2933 401423 24 API calls 2930->2933 2970 401423 2931->2970 2940 40165b 2933->2940 2938 40164a SetCurrentDirectoryW 2938->2940 2939 401617 GetFileAttributesW 2941 4015d1 2939->2941 2941->2928 2941->2939 2955 405e39 2941->2955 2959 405b08 2941->2959 2962 405a6e CreateDirectoryW 2941->2962 2967 405aeb CreateDirectoryW 2941->2967 2944 402db2 2943->2944 2974 40657a 2944->2974 2947 4015c8 2949 405eb7 CharNextW CharNextW 2947->2949 2950 405ed4 2949->2950 2954 405ee6 2949->2954 2951 405ee1 CharNextW 2950->2951 2950->2954 2952 405f0a 2951->2952 2952->2941 2953 405e39 CharNextW 2953->2954 2954->2952 2954->2953 2956 405e3f 2955->2956 2957 405e55 2956->2957 2958 405e46 CharNextW 2956->2958 2957->2941 2958->2956 3012 40690a GetModuleHandleA 2959->3012 2963 405abb 2962->2963 2964 405abf GetLastError 2962->2964 2963->2941 2964->2963 2965 405ace SetFileSecurityW 2964->2965 2965->2963 2966 405ae4 GetLastError 2965->2966 2966->2963 2968 405afb 2967->2968 2969 405aff GetLastError 2967->2969 2968->2941 2969->2968 3021 40559f 2970->3021 2973 40653d lstrcpynW 2973->2938 2978 406587 2974->2978 2975 4067aa 2976 402dd3 2975->2976 3007 40653d lstrcpynW 2975->3007 2976->2947 2991 4067c4 2976->2991 2978->2975 2979 406778 lstrlenW 2978->2979 2982 40657a 10 API calls 2978->2982 2983 40668f GetSystemDirectoryW 2978->2983 2985 4066a2 GetWindowsDirectoryW 2978->2985 2986 406719 lstrcatW 2978->2986 2987 40657a 10 API calls 2978->2987 2988 4067c4 5 API calls 2978->2988 2989 4066d1 SHGetSpecialFolderLocation 2978->2989 3000 40640b 2978->3000 3005 406484 wsprintfW 2978->3005 3006 40653d lstrcpynW 2978->3006 2979->2978 2982->2979 2983->2978 2985->2978 2986->2978 2987->2978 2988->2978 2989->2978 2990 4066e9 SHGetPathFromIDListW CoTaskMemFree 2989->2990 2990->2978 2997 4067d1 2991->2997 2992 406847 2993 40684c CharPrevW 2992->2993 2995 40686d 2992->2995 2993->2992 2994 40683a CharNextW 2994->2992 2994->2997 2995->2947 2996 405e39 CharNextW 2996->2997 2997->2992 2997->2994 2997->2996 2998 406826 CharNextW 2997->2998 2999 406835 CharNextW 2997->2999 2998->2997 2999->2994 3008 4063aa 3000->3008 3003 40646f 3003->2978 3004 40643f RegQueryValueExW RegCloseKey 3004->3003 3005->2978 3006->2978 3007->2976 3009 4063b9 3008->3009 3010 4063c2 RegOpenKeyExW 3009->3010 3011 4063bd 3009->3011 3010->3011 3011->3003 3011->3004 3013 406930 GetProcAddress 3012->3013 3014 406926 3012->3014 3016 405b0f 3013->3016 3018 40689a GetSystemDirectoryW 3014->3018 3016->2941 3017 40692c 3017->3013 3017->3016 3019 4068bc wsprintfW LoadLibraryExW 3018->3019 3019->3017 3022 4055ba 3021->3022 3023 401431 3021->3023 3024 4055d6 lstrlenW 3022->3024 3025 40657a 17 API calls 3022->3025 3023->2973 3026 4055e4 lstrlenW 3024->3026 3027 4055ff 3024->3027 3025->3024 3026->3023 3028 4055f6 lstrcatW 3026->3028 3029 405612 3027->3029 3030 405605 SetWindowTextW 3027->3030 3028->3027 3029->3023 3031 405618 SendMessageW SendMessageW SendMessageW 3029->3031 3030->3029 3031->3023 3032 401941 3033 401943 3032->3033 3034 402da6 17 API calls 3033->3034 3035 401948 3034->3035 3038 405c49 3035->3038 3074 405f14 3038->3074 3041 405c71 DeleteFileW 3072 401951 3041->3072 3042 405c88 3043 405da8 3042->3043 3088 40653d lstrcpynW 3042->3088 3043->3072 3106 406873 FindFirstFileW 3043->3106 3045 405cae 3046 405cc1 3045->3046 3047 405cb4 lstrcatW 3045->3047 3089 405e58 lstrlenW 3046->3089 3049 405cc7 3047->3049 3051 405cd7 lstrcatW 3049->3051 3053 405ce2 lstrlenW FindFirstFileW 3049->3053 3051->3053 3053->3043 3065 405d04 3053->3065 3056 405d8b FindNextFileW 3060 405da1 FindClose 3056->3060 3056->3065 3057 405c01 5 API calls 3059 405de3 3057->3059 3061 405de7 3059->3061 3062 405dfd 3059->3062 3060->3043 3066 40559f 24 API calls 3061->3066 3061->3072 3064 40559f 24 API calls 3062->3064 3064->3072 3065->3056 3067 405c49 60 API calls 3065->3067 3069 40559f 24 API calls 3065->3069 3071 40559f 24 API calls 3065->3071 3093 40653d lstrcpynW 3065->3093 3094 405c01 3065->3094 3102 4062fd MoveFileExW 3065->3102 3068 405df4 3066->3068 3067->3065 3070 4062fd 36 API calls 3068->3070 3069->3056 3070->3072 3071->3065 3112 40653d lstrcpynW 3074->3112 3076 405f25 3077 405eb7 4 API calls 3076->3077 3078 405f2b 3077->3078 3079 405c69 3078->3079 3080 4067c4 5 API calls 3078->3080 3079->3041 3079->3042 3086 405f3b 3080->3086 3081 405f6c lstrlenW 3082 405f77 3081->3082 3081->3086 3084 405e0c 3 API calls 3082->3084 3083 406873 2 API calls 3083->3086 3085 405f7c GetFileAttributesW 3084->3085 3085->3079 3086->3079 3086->3081 3086->3083 3087 405e58 2 API calls 3086->3087 3087->3081 3088->3045 3090 405e66 3089->3090 3091 405e78 3090->3091 3092 405e6c CharPrevW 3090->3092 3091->3049 3092->3090 3092->3091 3093->3065 3113 406008 GetFileAttributesW 3094->3113 3097 405c2e 3097->3065 3098 405c24 DeleteFileW 3100 405c2a 3098->3100 3099 405c1c RemoveDirectoryW 3099->3100 3100->3097 3101 405c3a SetFileAttributesW 3100->3101 3101->3097 3103 406311 3102->3103 3105 40631e 3102->3105 3116 406183 3103->3116 3105->3065 3107 405dcd 3106->3107 3108 406889 FindClose 3106->3108 3107->3072 3109 405e0c lstrlenW CharPrevW 3107->3109 3108->3107 3110 405dd7 3109->3110 3111 405e28 lstrcatW 3109->3111 3110->3057 3111->3110 3112->3076 3114 405c0d 3113->3114 3115 40601a SetFileAttributesW 3113->3115 3114->3097 3114->3098 3114->3099 3115->3114 3117 4061b3 3116->3117 3118 4061d9 GetShortPathNameW 3116->3118 3143 40602d GetFileAttributesW CreateFileW 3117->3143 3120 4062f8 3118->3120 3121 4061ee 3118->3121 3120->3105 3121->3120 3123 4061f6 wsprintfA 3121->3123 3122 4061bd CloseHandle GetShortPathNameW 3122->3120 3124 4061d1 3122->3124 3125 40657a 17 API calls 3123->3125 3124->3118 3124->3120 3126 40621e 3125->3126 3144 40602d GetFileAttributesW CreateFileW 3126->3144 3128 40622b 3128->3120 3129 40623a GetFileSize GlobalAlloc 3128->3129 3130 4062f1 CloseHandle 3129->3130 3131 40625c 3129->3131 3130->3120 3145 4060b0 ReadFile 3131->3145 3136 40627b lstrcpyA 3139 40629d 3136->3139 3137 40628f 3138 405f92 4 API calls 3137->3138 3138->3139 3140 4062d4 SetFilePointer 3139->3140 3152 4060df WriteFile 3140->3152 3143->3122 3144->3128 3146 4060ce 3145->3146 3146->3130 3147 405f92 lstrlenA 3146->3147 3148 405fd3 lstrlenA 3147->3148 3149 405fdb 3148->3149 3150 405fac lstrcmpiA 3148->3150 3149->3136 3149->3137 3150->3149 3151 405fca CharNextA 3150->3151 3151->3148 3153 4060fd GlobalFree 3152->3153 3153->3130 3168 401c43 3169 402d84 17 API calls 3168->3169 3170 401c4a 3169->3170 3171 402d84 17 API calls 3170->3171 3172 401c57 3171->3172 3173 401c6c 3172->3173 3174 402da6 17 API calls 3172->3174 3175 401c7c 3173->3175 3176 402da6 17 API calls 3173->3176 3174->3173 3177 401cd3 3175->3177 3178 401c87 3175->3178 3176->3175 3180 402da6 17 API calls 3177->3180 3179 402d84 17 API calls 3178->3179 3182 401c8c 3179->3182 3181 401cd8 3180->3181 3183 402da6 17 API calls 3181->3183 3184 402d84 17 API calls 3182->3184 3185 401ce1 FindWindowExW 3183->3185 3186 401c98 3184->3186 3189 401d03 3185->3189 3187 401cc3 SendMessageW 3186->3187 3188 401ca5 SendMessageTimeoutW 3186->3188 3187->3189 3188->3189 3834 404943 3835 404953 3834->3835 3836 404979 3834->3836 3837 404499 18 API calls 3835->3837 3838 404500 8 API calls 3836->3838 3839 404960 SetDlgItemTextW 3837->3839 3840 404985 3838->3840 3839->3836 3841 4028c4 3842 4028ca 3841->3842 3843 4028d2 FindClose 3842->3843 3844 402c2a 3842->3844 3843->3844 3848 4016cc 3849 402da6 17 API calls 3848->3849 3850 4016d2 GetFullPathNameW 3849->3850 3851 4016ec 3850->3851 3857 40170e 3850->3857 3854 406873 2 API calls 3851->3854 3851->3857 3852 401723 GetShortPathNameW 3853 402c2a 3852->3853 3855 4016fe 3854->3855 3855->3857 3858 40653d lstrcpynW 3855->3858 3857->3852 3857->3853 3858->3857 3859 401e4e GetDC 3860 402d84 17 API calls 3859->3860 3861 401e60 GetDeviceCaps MulDiv ReleaseDC 3860->3861 3862 402d84 17 API calls 3861->3862 3863 401e91 3862->3863 3864 40657a 17 API calls 3863->3864 3865 401ece CreateFontIndirectW 3864->3865 3866 402638 3865->3866 3867 4045cf lstrcpynW lstrlenW 3868 402950 3869 402da6 17 API calls 3868->3869 3871 40295c 3869->3871 3870 402972 3873 406008 2 API calls 3870->3873 3871->3870 3872 402da6 17 API calls 3871->3872 3872->3870 3874 402978 3873->3874 3896 40602d GetFileAttributesW CreateFileW 3874->3896 3876 402985 3877 402a3b 3876->3877 3878 4029a0 GlobalAlloc 3876->3878 3879 402a23 3876->3879 3880 402a42 DeleteFileW 3877->3880 3881 402a55 3877->3881 3878->3879 3882 4029b9 3878->3882 3883 4032b4 31 API calls 3879->3883 3880->3881 3897 4034e5 SetFilePointer 3882->3897 3885 402a30 CloseHandle 3883->3885 3885->3877 3886 4029bf 3887 4034cf ReadFile 3886->3887 3888 4029c8 GlobalAlloc 3887->3888 3889 4029d8 3888->3889 3890 402a0c 3888->3890 3891 4032b4 31 API calls 3889->3891 3892 4060df WriteFile 3890->3892 3895 4029e5 3891->3895 3893 402a18 GlobalFree 3892->3893 3893->3879 3894 402a03 GlobalFree 3894->3890 3895->3894 3896->3876 3897->3886 3898 401956 3899 402da6 17 API calls 3898->3899 3900 40195d lstrlenW 3899->3900 3901 402638 3900->3901 3902 4014d7 3903 402d84 17 API calls 3902->3903 3904 4014dd Sleep 3903->3904 3906 402c2a 3904->3906 3617 4020d8 3618 4020ea 3617->3618 3628 40219c 3617->3628 3619 402da6 17 API calls 3618->3619 3621 4020f1 3619->3621 3620 401423 24 API calls 3626 4022f6 3620->3626 3622 402da6 17 API calls 3621->3622 3623 4020fa 3622->3623 3624 402110 LoadLibraryExW 3623->3624 3625 402102 GetModuleHandleW 3623->3625 3627 402121 3624->3627 3624->3628 3625->3624 3625->3627 3637 406979 3627->3637 3628->3620 3631 402132 3634 401423 24 API calls 3631->3634 3635 402142 3631->3635 3632 40216b 3633 40559f 24 API calls 3632->3633 3633->3635 3634->3635 3635->3626 3636 40218e FreeLibrary 3635->3636 3636->3626 3642 40655f WideCharToMultiByte 3637->3642 3639 406996 3640 40699d GetProcAddress 3639->3640 3641 40212c 3639->3641 3640->3641 3641->3631 3641->3632 3642->3639 3907 404658 3908 404670 3907->3908 3914 40478a 3907->3914 3915 404499 18 API calls 3908->3915 3909 4047f4 3910 4048be 3909->3910 3911 4047fe GetDlgItem 3909->3911 3916 404500 8 API calls 3910->3916 3912 404818 3911->3912 3913 40487f 3911->3913 3912->3913 3920 40483e SendMessageW LoadCursorW SetCursor 3912->3920 3913->3910 3921 404891 3913->3921 3914->3909 3914->3910 3917 4047c5 GetDlgItem SendMessageW 3914->3917 3918 4046d7 3915->3918 3919 4048b9 3916->3919 3940 4044bb KiUserCallbackDispatcher 3917->3940 3923 404499 18 API calls 3918->3923 3944 404907 3920->3944 3926 4048a7 3921->3926 3927 404897 SendMessageW 3921->3927 3924 4046e4 CheckDlgButton 3923->3924 3938 4044bb KiUserCallbackDispatcher 3924->3938 3926->3919 3931 4048ad SendMessageW 3926->3931 3927->3926 3928 4047ef 3941 4048e3 3928->3941 3931->3919 3933 404702 GetDlgItem 3939 4044ce SendMessageW 3933->3939 3935 404718 SendMessageW 3936 404735 GetSysColor 3935->3936 3937 40473e SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3935->3937 3936->3937 3937->3919 3938->3933 3939->3935 3940->3928 3942 4048f1 3941->3942 3943 4048f6 SendMessageW 3941->3943 3942->3943 3943->3909 3947 405b63 ShellExecuteExW 3944->3947 3946 40486d LoadCursorW SetCursor 3946->3913 3947->3946 3948 402b59 3949 402b60 3948->3949 3950 402bab 3948->3950 3953 402d84 17 API calls 3949->3953 3956 402ba9 3949->3956 3951 40690a 5 API calls 3950->3951 3952 402bb2 3951->3952 3954 402da6 17 API calls 3952->3954 3955 402b6e 3953->3955 3957 402bbb 3954->3957 3958 402d84 17 API calls 3955->3958 3957->3956 3959 402bbf IIDFromString 3957->3959 3961 402b7a 3958->3961 3959->3956 3960 402bce 3959->3960 3960->3956 3966 40653d lstrcpynW 3960->3966 3965 406484 wsprintfW 3961->3965 3964 402beb CoTaskMemFree 3964->3956 3965->3956 3966->3964 3760 40175c 3761 402da6 17 API calls 3760->3761 3762 401763 3761->3762 3763 40605c 2 API calls 3762->3763 3764 40176a 3763->3764 3765 40605c 2 API calls 3764->3765 3765->3764 3967 401d5d 3968 402d84 17 API calls 3967->3968 3969 401d6e SetWindowLongW 3968->3969 3970 402c2a 3969->3970 3766 4056de 3767 405888 3766->3767 3768 4056ff GetDlgItem GetDlgItem GetDlgItem 3766->3768 3770 405891 GetDlgItem CreateThread CloseHandle 3767->3770 3771 4058b9 3767->3771 3811 4044ce SendMessageW 3768->3811 3770->3771 3814 405672 5 API calls 3770->3814 3773 4058e4 3771->3773 3775 4058d0 ShowWindow ShowWindow 3771->3775 3776 405909 3771->3776 3772 40576f 3780 405776 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3772->3780 3774 405944 3773->3774 3777 4058f8 3773->3777 3778 40591e ShowWindow 3773->3778 3774->3776 3787 405952 SendMessageW 3774->3787 3813 4044ce SendMessageW 3775->3813 3779 404500 8 API calls 3776->3779 3782 404472 SendMessageW 3777->3782 3783 405930 3778->3783 3784 40593e 3778->3784 3792 405917 3779->3792 3785 4057e4 3780->3785 3786 4057c8 SendMessageW SendMessageW 3780->3786 3782->3776 3788 40559f 24 API calls 3783->3788 3789 404472 SendMessageW 3784->3789 3790 4057f7 3785->3790 3791 4057e9 SendMessageW 3785->3791 3786->3785 3787->3792 3793 40596b CreatePopupMenu 3787->3793 3788->3784 3789->3774 3795 404499 18 API calls 3790->3795 3791->3790 3794 40657a 17 API calls 3793->3794 3796 40597b AppendMenuW 3794->3796 3797 405807 3795->3797 3798 405998 GetWindowRect 3796->3798 3799 4059ab TrackPopupMenu 3796->3799 3800 405810 ShowWindow 3797->3800 3801 405844 GetDlgItem SendMessageW 3797->3801 3798->3799 3799->3792 3802 4059c6 3799->3802 3803 405833 3800->3803 3804 405826 ShowWindow 3800->3804 3801->3792 3805 40586b SendMessageW SendMessageW 3801->3805 3806 4059e2 SendMessageW 3802->3806 3812 4044ce SendMessageW 3803->3812 3804->3803 3805->3792 3806->3806 3807 4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3806->3807 3809 405a24 SendMessageW 3807->3809 3809->3809 3810 405a4d GlobalUnlock SetClipboardData CloseClipboard 3809->3810 3810->3792 3811->3772 3812->3801 3813->3773 3815 401ede 3816 402d84 17 API calls 3815->3816 3817 401ee4 3816->3817 3818 402d84 17 API calls 3817->3818 3819 401ef0 3818->3819 3820 401f07 EnableWindow 3819->3820 3821 401efc ShowWindow 3819->3821 3822 402c2a 3820->3822 3821->3822 3971 4028de 3972 4028e6 3971->3972 3973 4028ea FindNextFileW 3972->3973 3976 4028fc 3972->3976 3974 402943 3973->3974 3973->3976 3977 40653d lstrcpynW 3974->3977 3977->3976 3978 404ce0 3979 404cf0 3978->3979 3980 404d0c 3978->3980 3989 405b81 GetDlgItemTextW 3979->3989 3981 404d12 SHGetPathFromIDListW 3980->3981 3982 404d3f 3980->3982 3984 404d29 SendMessageW 3981->3984 3985 404d22 3981->3985 3984->3982 3987 40140b 2 API calls 3985->3987 3986 404cfd SendMessageW 3986->3980 3987->3984 3989->3986 3190 405b63 ShellExecuteExW 3990 401563 3991 402ba4 3990->3991 3994 406484 wsprintfW 3991->3994 3993 402ba9 3994->3993 3995 401968 3996 402d84 17 API calls 3995->3996 3997 40196f 3996->3997 3998 402d84 17 API calls 3997->3998 3999 40197c 3998->3999 4000 402da6 17 API calls 3999->4000 4001 401993 lstrlenW 4000->4001 4002 4019a4 4001->4002 4006 4019e5 4002->4006 4007 40653d lstrcpynW 4002->4007 4004 4019d5 4005 4019da lstrlenW 4004->4005 4004->4006 4005->4006 4007->4004 4008 40166a 4009 402da6 17 API calls 4008->4009 4010 401670 4009->4010 4011 406873 2 API calls 4010->4011 4012 401676 4011->4012 4013 402aeb 4014 402d84 17 API calls 4013->4014 4015 402af1 4014->4015 4016 40292e 4015->4016 4017 40657a 17 API calls 4015->4017 4017->4016 3286 4026ec 3287 402d84 17 API calls 3286->3287 3288 4026fb 3287->3288 3289 402745 ReadFile 3288->3289 3290 4060b0 ReadFile 3288->3290 3291 4027de 3288->3291 3293 402785 MultiByteToWideChar 3288->3293 3294 40283a 3288->3294 3296 4027ab SetFilePointer MultiByteToWideChar 3288->3296 3297 40284b 3288->3297 3299 402838 3288->3299 3289->3288 3289->3299 3290->3288 3291->3288 3291->3299 3300 40610e SetFilePointer 3291->3300 3293->3288 3309 406484 wsprintfW 3294->3309 3296->3288 3298 40286c SetFilePointer 3297->3298 3297->3299 3298->3299 3301 40612a 3300->3301 3304 406142 3300->3304 3302 4060b0 ReadFile 3301->3302 3303 406136 3302->3303 3303->3304 3305 406173 SetFilePointer 3303->3305 3306 40614b SetFilePointer 3303->3306 3304->3291 3305->3304 3306->3305 3307 406156 3306->3307 3308 4060df WriteFile 3307->3308 3308->3304 3309->3299 3556 40176f 3557 402da6 17 API calls 3556->3557 3558 401776 3557->3558 3559 401796 3558->3559 3560 40179e 3558->3560 3595 40653d lstrcpynW 3559->3595 3596 40653d lstrcpynW 3560->3596 3563 40179c 3567 4067c4 5 API calls 3563->3567 3564 4017a9 3565 405e0c 3 API calls 3564->3565 3566 4017af lstrcatW 3565->3566 3566->3563 3584 4017bb 3567->3584 3568 406873 2 API calls 3568->3584 3569 406008 2 API calls 3569->3584 3571 4017cd CompareFileTime 3571->3584 3572 40188d 3574 40559f 24 API calls 3572->3574 3573 401864 3575 40559f 24 API calls 3573->3575 3579 401879 3573->3579 3577 401897 3574->3577 3575->3579 3576 40653d lstrcpynW 3576->3584 3578 4032b4 31 API calls 3577->3578 3580 4018aa 3578->3580 3581 4018be SetFileTime 3580->3581 3582 4018d0 CloseHandle 3580->3582 3581->3582 3582->3579 3585 4018e1 3582->3585 3583 40657a 17 API calls 3583->3584 3584->3568 3584->3569 3584->3571 3584->3572 3584->3573 3584->3576 3584->3583 3590 405b9d MessageBoxIndirectW 3584->3590 3594 40602d GetFileAttributesW CreateFileW 3584->3594 3586 4018e6 3585->3586 3587 4018f9 3585->3587 3588 40657a 17 API calls 3586->3588 3589 40657a 17 API calls 3587->3589 3591 4018ee lstrcatW 3588->3591 3592 401901 3589->3592 3590->3584 3591->3592 3593 405b9d MessageBoxIndirectW 3592->3593 3593->3579 3594->3584 3595->3563 3596->3564 4018 401a72 4019 402d84 17 API calls 4018->4019 4020 401a7b 4019->4020 4021 402d84 17 API calls 4020->4021 4022 401a20 4021->4022 4023 401573 4024 401583 ShowWindow 4023->4024 4025 40158c 4023->4025 4024->4025 4026 402c2a 4025->4026 4027 40159a ShowWindow 4025->4027 4027->4026 4028 4023f4 4029 402da6 17 API calls 4028->4029 4030 402403 4029->4030 4031 402da6 17 API calls 4030->4031 4032 40240c 4031->4032 4033 402da6 17 API calls 4032->4033 4034 402416 GetPrivateProfileStringW 4033->4034 4035 4014f5 SetForegroundWindow 4036 402c2a 4035->4036 4037 401ff6 4038 402da6 17 API calls 4037->4038 4039 401ffd 4038->4039 4040 406873 2 API calls 4039->4040 4041 402003 4040->4041 4043 402014 4041->4043 4044 406484 wsprintfW 4041->4044 4044->4043 4045 401b77 4046 402da6 17 API calls 4045->4046 4047 401b7e 4046->4047 4048 402d84 17 API calls 4047->4048 4049 401b87 wsprintfW 4048->4049 4050 402c2a 4049->4050 4051 40167b 4052 402da6 17 API calls 4051->4052 4053 401682 4052->4053 4054 402da6 17 API calls 4053->4054 4055 40168b 4054->4055 4056 402da6 17 API calls 4055->4056 4057 401694 MoveFileW 4056->4057 4058 4016a7 4057->4058 4064 4016a0 4057->4064 4060 406873 2 API calls 4058->4060 4062 4022f6 4058->4062 4059 401423 24 API calls 4059->4062 4061 4016b6 4060->4061 4061->4062 4063 4062fd 36 API calls 4061->4063 4063->4064 4064->4059 4065 4019ff 4066 402da6 17 API calls 4065->4066 4067 401a06 4066->4067 4068 402da6 17 API calls 4067->4068 4069 401a0f 4068->4069 4070 401a16 lstrcmpiW 4069->4070 4071 401a28 lstrcmpW 4069->4071 4072 401a1c 4070->4072 4071->4072 4073 4022ff 4074 402da6 17 API calls 4073->4074 4075 402305 4074->4075 4076 402da6 17 API calls 4075->4076 4077 40230e 4076->4077 4078 402da6 17 API calls 4077->4078 4079 402317 4078->4079 4080 406873 2 API calls 4079->4080 4081 402320 4080->4081 4082 402331 lstrlenW lstrlenW 4081->4082 4083 402324 4081->4083 4085 40559f 24 API calls 4082->4085 4084 40559f 24 API calls 4083->4084 4087 40232c 4083->4087 4084->4087 4086 40236f SHFileOperationW 4085->4086 4086->4083 4086->4087 4088 401000 4089 401037 BeginPaint GetClientRect 4088->4089 4090 40100c DefWindowProcW 4088->4090 4092 4010f3 4089->4092 4095 401179 4090->4095 4093 401073 CreateBrushIndirect FillRect DeleteObject 4092->4093 4094 4010fc 4092->4094 4093->4092 4096 401102 CreateFontIndirectW 4094->4096 4097 401167 EndPaint 4094->4097 4096->4097 4098 401112 6 API calls 4096->4098 4097->4095 4098->4097 3154 401d81 3155 401d94 GetDlgItem 3154->3155 3156 401d87 3154->3156 3157 401d8e 3155->3157 3165 402d84 3156->3165 3159 401dd5 GetClientRect LoadImageW SendMessageW 3157->3159 3160 402da6 17 API calls 3157->3160 3162 401e33 3159->3162 3164 401e3f 3159->3164 3160->3159 3163 401e38 DeleteObject 3162->3163 3162->3164 3163->3164 3166 40657a 17 API calls 3165->3166 3167 402d99 3166->3167 3167->3157 4099 401503 4100 40150b 4099->4100 4102 40151e 4099->4102 4101 402d84 17 API calls 4100->4101 4101->4102 4103 402383 4104 40238a 4103->4104 4107 40239d 4103->4107 4105 40657a 17 API calls 4104->4105 4106 402397 4105->4106 4108 405b9d MessageBoxIndirectW 4106->4108 4108->4107 3217 402c05 SendMessageW 3218 402c2a 3217->3218 3219 402c1f InvalidateRect 3217->3219 3219->3218 4109 404f06 GetDlgItem GetDlgItem 4110 404f58 7 API calls 4109->4110 4116 40517d 4109->4116 4111 404ff2 SendMessageW 4110->4111 4112 404fff DeleteObject 4110->4112 4111->4112 4113 405008 4112->4113 4114 40503f 4113->4114 4117 40657a 17 API calls 4113->4117 4118 404499 18 API calls 4114->4118 4115 40525f 4119 40530b 4115->4119 4129 4052b8 SendMessageW 4115->4129 4149 405170 4115->4149 4116->4115 4120 4051ec 4116->4120 4163 404e54 SendMessageW 4116->4163 4123 405021 SendMessageW SendMessageW 4117->4123 4124 405053 4118->4124 4121 405315 SendMessageW 4119->4121 4122 40531d 4119->4122 4120->4115 4125 405251 SendMessageW 4120->4125 4121->4122 4131 405336 4122->4131 4132 40532f ImageList_Destroy 4122->4132 4147 405346 4122->4147 4123->4113 4128 404499 18 API calls 4124->4128 4125->4115 4126 404500 8 API calls 4130 40550c 4126->4130 4142 405064 4128->4142 4134 4052cd SendMessageW 4129->4134 4129->4149 4135 40533f GlobalFree 4131->4135 4131->4147 4132->4131 4133 4054c0 4138 4054d2 ShowWindow GetDlgItem ShowWindow 4133->4138 4133->4149 4137 4052e0 4134->4137 4135->4147 4136 40513f GetWindowLongW SetWindowLongW 4139 405158 4136->4139 4148 4052f1 SendMessageW 4137->4148 4138->4149 4140 405175 4139->4140 4141 40515d ShowWindow 4139->4141 4162 4044ce SendMessageW 4140->4162 4161 4044ce SendMessageW 4141->4161 4142->4136 4143 40513a 4142->4143 4146 4050b7 SendMessageW 4142->4146 4150 4050f5 SendMessageW 4142->4150 4151 405109 SendMessageW 4142->4151 4143->4136 4143->4139 4146->4142 4147->4133 4154 405381 4147->4154 4168 404ed4 4147->4168 4148->4119 4149->4126 4150->4142 4151->4142 4153 40548b 4155 405496 InvalidateRect 4153->4155 4158 4054a2 4153->4158 4156 4053af SendMessageW 4154->4156 4157 4053c5 4154->4157 4155->4158 4156->4157 4157->4153 4159 405439 SendMessageW SendMessageW 4157->4159 4158->4133 4177 404e0f 4158->4177 4159->4157 4161->4149 4162->4116 4164 404eb3 SendMessageW 4163->4164 4165 404e77 GetMessagePos ScreenToClient SendMessageW 4163->4165 4167 404eab 4164->4167 4166 404eb0 4165->4166 4165->4167 4166->4164 4167->4120 4180 40653d lstrcpynW 4168->4180 4170 404ee7 4181 406484 wsprintfW 4170->4181 4172 404ef1 4173 40140b 2 API calls 4172->4173 4174 404efa 4173->4174 4182 40653d lstrcpynW 4174->4182 4176 404f01 4176->4154 4183 404d46 4177->4183 4179 404e24 4179->4133 4180->4170 4181->4172 4182->4176 4184 404d5f 4183->4184 4185 40657a 17 API calls 4184->4185 4186 404dc3 4185->4186 4187 40657a 17 API calls 4186->4187 4188 404dce 4187->4188 4189 40657a 17 API calls 4188->4189 4190 404de4 lstrlenW wsprintfW SetDlgItemTextW 4189->4190 4190->4179 4191 404609 lstrlenW 4192 404628 4191->4192 4193 40462a WideCharToMultiByte 4191->4193 4192->4193 3220 40248a 3221 402da6 17 API calls 3220->3221 3222 40249c 3221->3222 3223 402da6 17 API calls 3222->3223 3224 4024a6 3223->3224 3237 402e36 3224->3237 3227 40292e 3228 4024de 3230 4024ea 3228->3230 3232 402d84 17 API calls 3228->3232 3229 402da6 17 API calls 3231 4024d4 lstrlenW 3229->3231 3233 402509 RegSetValueExW 3230->3233 3241 4032b4 3230->3241 3231->3228 3232->3230 3235 40251f RegCloseKey 3233->3235 3235->3227 3238 402e51 3237->3238 3261 4063d8 3238->3261 3242 4032cd 3241->3242 3243 4032fb 3242->3243 3268 4034e5 SetFilePointer 3242->3268 3265 4034cf 3243->3265 3247 403468 3249 4034aa 3247->3249 3252 40346c 3247->3252 3248 403318 GetTickCount 3253 403452 3248->3253 3257 403367 3248->3257 3250 4034cf ReadFile 3249->3250 3250->3253 3251 4034cf ReadFile 3251->3257 3252->3253 3254 4034cf ReadFile 3252->3254 3255 4060df WriteFile 3252->3255 3253->3233 3254->3252 3255->3252 3256 4033bd GetTickCount 3256->3257 3257->3251 3257->3253 3257->3256 3258 4033e2 MulDiv wsprintfW 3257->3258 3260 4060df WriteFile 3257->3260 3259 40559f 24 API calls 3258->3259 3259->3257 3260->3257 3262 4063e7 3261->3262 3263 4063f2 RegCreateKeyExW 3262->3263 3264 4024b6 3262->3264 3263->3264 3264->3227 3264->3228 3264->3229 3266 4060b0 ReadFile 3265->3266 3267 403306 3266->3267 3267->3247 3267->3248 3267->3253 3268->3243 4194 40498a 4195 4049b6 4194->4195 4196 4049c7 4194->4196 4255 405b81 GetDlgItemTextW 4195->4255 4197 4049d3 GetDlgItem 4196->4197 4204 404a32 4196->4204 4200 4049e7 4197->4200 4199 4049c1 4202 4067c4 5 API calls 4199->4202 4203 4049fb SetWindowTextW 4200->4203 4207 405eb7 4 API calls 4200->4207 4201 404b16 4253 404cc5 4201->4253 4257 405b81 GetDlgItemTextW 4201->4257 4202->4196 4208 404499 18 API calls 4203->4208 4204->4201 4209 40657a 17 API calls 4204->4209 4204->4253 4206 404500 8 API calls 4211 404cd9 4206->4211 4212 4049f1 4207->4212 4213 404a17 4208->4213 4214 404aa6 SHBrowseForFolderW 4209->4214 4210 404b46 4215 405f14 18 API calls 4210->4215 4212->4203 4219 405e0c 3 API calls 4212->4219 4216 404499 18 API calls 4213->4216 4214->4201 4217 404abe CoTaskMemFree 4214->4217 4218 404b4c 4215->4218 4220 404a25 4216->4220 4221 405e0c 3 API calls 4217->4221 4258 40653d lstrcpynW 4218->4258 4219->4203 4256 4044ce SendMessageW 4220->4256 4223 404acb 4221->4223 4226 404b02 SetDlgItemTextW 4223->4226 4230 40657a 17 API calls 4223->4230 4225 404a2b 4228 40690a 5 API calls 4225->4228 4226->4201 4227 404b63 4229 40690a 5 API calls 4227->4229 4228->4204 4241 404b6a 4229->4241 4231 404aea lstrcmpiW 4230->4231 4231->4226 4233 404afb lstrcatW 4231->4233 4232 404bab 4259 40653d lstrcpynW 4232->4259 4233->4226 4235 404bb2 4236 405eb7 4 API calls 4235->4236 4237 404bb8 GetDiskFreeSpaceW 4236->4237 4239 404bdc MulDiv 4237->4239 4243 404c03 4237->4243 4239->4243 4240 405e58 2 API calls 4240->4241 4241->4232 4241->4240 4241->4243 4242 404c74 4245 404c97 4242->4245 4247 40140b 2 API calls 4242->4247 4243->4242 4244 404e0f 20 API calls 4243->4244 4246 404c61 4244->4246 4260 4044bb KiUserCallbackDispatcher 4245->4260 4248 404c76 SetDlgItemTextW 4246->4248 4249 404c66 4246->4249 4247->4245 4248->4242 4251 404d46 20 API calls 4249->4251 4251->4242 4252 404cb3 4252->4253 4254 4048e3 SendMessageW 4252->4254 4253->4206 4254->4253 4255->4199 4256->4225 4257->4210 4258->4227 4259->4235 4260->4252 4261 40290b 4262 402da6 17 API calls 4261->4262 4263 402912 FindFirstFileW 4262->4263 4264 40293a 4263->4264 4267 402925 4263->4267 4269 406484 wsprintfW 4264->4269 4266 402943 4270 40653d lstrcpynW 4266->4270 4269->4266 4270->4267 4271 40190c 4272 401943 4271->4272 4273 402da6 17 API calls 4272->4273 4274 401948 4273->4274 4275 405c49 67 API calls 4274->4275 4276 401951 4275->4276 4277 40190f 4278 402da6 17 API calls 4277->4278 4279 401916 4278->4279 4280 405b9d MessageBoxIndirectW 4279->4280 4281 40191f 4280->4281 3597 402891 3598 402898 3597->3598 3599 402ba9 3597->3599 3600 402d84 17 API calls 3598->3600 3601 40289f 3600->3601 3602 4028ae SetFilePointer 3601->3602 3602->3599 3603 4028be 3602->3603 3605 406484 wsprintfW 3603->3605 3605->3599 4282 401491 4283 40559f 24 API calls 4282->4283 4284 401498 4283->4284 3606 403b12 3607 403b2a 3606->3607 3608 403b1c CloseHandle 3606->3608 3613 403b57 3607->3613 3608->3607 3611 405c49 67 API calls 3612 403b3b 3611->3612 3615 403b65 3613->3615 3614 403b2f 3614->3611 3615->3614 3616 403b6a FreeLibrary GlobalFree 3615->3616 3616->3614 3616->3616 4285 401f12 4286 402da6 17 API calls 4285->4286 4287 401f18 4286->4287 4288 402da6 17 API calls 4287->4288 4289 401f21 4288->4289 4290 402da6 17 API calls 4289->4290 4291 401f2a 4290->4291 4292 402da6 17 API calls 4291->4292 4293 401f33 4292->4293 4294 401423 24 API calls 4293->4294 4295 401f3a 4294->4295 4302 405b63 ShellExecuteExW 4295->4302 4297 401f82 4298 40292e 4297->4298 4299 4069b5 5 API calls 4297->4299 4300 401f9f CloseHandle 4299->4300 4300->4298 4302->4297 4303 405513 4304 405523 4303->4304 4305 405537 4303->4305 4306 405580 4304->4306 4307 405529 4304->4307 4308 40553f IsWindowVisible 4305->4308 4314 405556 4305->4314 4309 405585 CallWindowProcW 4306->4309 4310 4044e5 SendMessageW 4307->4310 4308->4306 4311 40554c 4308->4311 4312 405533 4309->4312 4310->4312 4313 404e54 5 API calls 4311->4313 4313->4314 4314->4309 4315 404ed4 4 API calls 4314->4315 4315->4306 4316 402f93 4317 402fa5 SetTimer 4316->4317 4318 402fbe 4316->4318 4317->4318 4319 403013 4318->4319 4320 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4318->4320 4320->4319 4321 401d17 4322 402d84 17 API calls 4321->4322 4323 401d1d IsWindow 4322->4323 4324 401a20 4323->4324 3643 403f9a 3644 403fb2 3643->3644 3645 404113 3643->3645 3644->3645 3646 403fbe 3644->3646 3647 404164 3645->3647 3648 404124 GetDlgItem GetDlgItem 3645->3648 3650 403fc9 SetWindowPos 3646->3650 3651 403fdc 3646->3651 3649 4041be 3647->3649 3660 401389 2 API calls 3647->3660 3652 404499 18 API calls 3648->3652 3653 4044e5 SendMessageW 3649->3653 3661 40410e 3649->3661 3650->3651 3654 403fe5 ShowWindow 3651->3654 3655 404027 3651->3655 3656 40414e SetClassLongW 3652->3656 3682 4041d0 3653->3682 3662 4040d1 3654->3662 3663 404005 GetWindowLongW 3654->3663 3657 404046 3655->3657 3658 40402f DestroyWindow 3655->3658 3659 40140b 2 API calls 3656->3659 3665 40404b SetWindowLongW 3657->3665 3666 40405c 3657->3666 3664 404422 3658->3664 3659->3647 3667 404196 3660->3667 3723 404500 3662->3723 3663->3662 3669 40401e ShowWindow 3663->3669 3664->3661 3676 404453 ShowWindow 3664->3676 3665->3661 3666->3662 3670 404068 GetDlgItem 3666->3670 3667->3649 3671 40419a SendMessageW 3667->3671 3669->3655 3674 404096 3670->3674 3675 404079 SendMessageW IsWindowEnabled 3670->3675 3671->3661 3672 40140b 2 API calls 3672->3682 3673 404424 DestroyWindow KiUserCallbackDispatcher 3673->3664 3678 4040a3 3674->3678 3680 4040ea SendMessageW 3674->3680 3681 4040b6 3674->3681 3688 40409b 3674->3688 3675->3661 3675->3674 3676->3661 3677 40657a 17 API calls 3677->3682 3678->3680 3678->3688 3680->3662 3683 4040d3 3681->3683 3684 4040be 3681->3684 3682->3661 3682->3672 3682->3673 3682->3677 3685 404499 18 API calls 3682->3685 3705 404364 DestroyWindow 3682->3705 3714 404499 3682->3714 3686 40140b 2 API calls 3683->3686 3687 40140b 2 API calls 3684->3687 3685->3682 3686->3688 3687->3688 3688->3662 3720 404472 3688->3720 3690 40424b GetDlgItem 3691 404260 3690->3691 3692 404268 ShowWindow KiUserCallbackDispatcher 3690->3692 3691->3692 3717 4044bb KiUserCallbackDispatcher 3692->3717 3694 404292 KiUserCallbackDispatcher 3699 4042a6 3694->3699 3695 4042ab GetSystemMenu EnableMenuItem SendMessageW 3696 4042db SendMessageW 3695->3696 3695->3699 3696->3699 3698 403f7b 18 API calls 3698->3699 3699->3695 3699->3698 3718 4044ce SendMessageW 3699->3718 3719 40653d lstrcpynW 3699->3719 3701 40430a lstrlenW 3702 40657a 17 API calls 3701->3702 3703 404320 SetWindowTextW 3702->3703 3704 401389 2 API calls 3703->3704 3704->3682 3705->3664 3706 40437e CreateDialogParamW 3705->3706 3706->3664 3707 4043b1 3706->3707 3708 404499 18 API calls 3707->3708 3709 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3708->3709 3710 401389 2 API calls 3709->3710 3711 404402 3710->3711 3711->3661 3712 40440a ShowWindow 3711->3712 3713 4044e5 SendMessageW 3712->3713 3713->3664 3715 40657a 17 API calls 3714->3715 3716 4044a4 SetDlgItemTextW 3715->3716 3716->3690 3717->3694 3718->3699 3719->3701 3721 404479 3720->3721 3722 40447f SendMessageW 3720->3722 3721->3722 3722->3662 3724 4045c3 3723->3724 3725 404518 GetWindowLongW 3723->3725 3724->3661 3725->3724 3726 40452d 3725->3726 3726->3724 3727 40455a GetSysColor 3726->3727 3728 40455d 3726->3728 3727->3728 3729 404563 SetTextColor 3728->3729 3730 40456d SetBkMode 3728->3730 3729->3730 3731 404585 GetSysColor 3730->3731 3732 40458b 3730->3732 3731->3732 3733 404592 SetBkColor 3732->3733 3734 40459c 3732->3734 3733->3734 3734->3724 3735 4045b6 CreateBrushIndirect 3734->3735 3736 4045af DeleteObject 3734->3736 3735->3724 3736->3735 3737 401b9b 3738 401ba8 3737->3738 3739 401bec 3737->3739 3744 401c31 3738->3744 3745 401bbf 3738->3745 3740 401bf1 3739->3740 3741 401c16 GlobalAlloc 3739->3741 3746 40239d 3740->3746 3756 40653d lstrcpynW 3740->3756 3742 40657a 17 API calls 3741->3742 3742->3744 3743 40657a 17 API calls 3747 402397 3743->3747 3744->3743 3744->3746 3757 40653d lstrcpynW 3745->3757 3752 405b9d MessageBoxIndirectW 3747->3752 3750 401c03 GlobalFree 3750->3746 3751 401bce 3758 40653d lstrcpynW 3751->3758 3752->3746 3754 401bdd 3759 40653d lstrcpynW 3754->3759 3756->3750 3757->3751 3758->3754 3759->3746 4325 40261c 4326 402da6 17 API calls 4325->4326 4327 402623 4326->4327 4330 40602d GetFileAttributesW CreateFileW 4327->4330 4329 40262f 4330->4329 3823 40259e 3824 402de6 17 API calls 3823->3824 3825 4025a8 3824->3825 3826 402d84 17 API calls 3825->3826 3827 4025b1 3826->3827 3828 4025d9 RegEnumValueW 3827->3828 3829 4025cd RegEnumKeyW 3827->3829 3830 40292e 3827->3830 3831 4025f5 RegCloseKey 3828->3831 3832 4025ee 3828->3832 3829->3831 3831->3830 3832->3831 4331 40149e 4332 4014ac PostQuitMessage 4331->4332 4333 40239d 4331->4333 4332->4333 4334 4015a3 4335 402da6 17 API calls 4334->4335 4336 4015aa SetFileAttributesW 4335->4336 4337 4015bc 4336->4337 3191 401fa4 3192 402da6 17 API calls 3191->3192 3193 401faa 3192->3193 3194 40559f 24 API calls 3193->3194 3195 401fb4 3194->3195 3204 405b20 CreateProcessW 3195->3204 3198 40292e 3201 401fcf 3202 401fdd CloseHandle 3201->3202 3212 406484 wsprintfW 3201->3212 3202->3198 3205 405b53 CloseHandle 3204->3205 3206 401fba 3204->3206 3205->3206 3206->3198 3206->3202 3207 4069b5 WaitForSingleObject 3206->3207 3208 4069cf 3207->3208 3209 4069e1 GetExitCodeProcess 3208->3209 3213 406946 3208->3213 3209->3201 3212->3202 3214 406963 PeekMessageW 3213->3214 3215 406973 WaitForSingleObject 3214->3215 3216 406959 DispatchMessageW 3214->3216 3215->3208 3216->3214 3269 40252a 3280 402de6 3269->3280 3272 402da6 17 API calls 3273 40253d 3272->3273 3274 402548 RegQueryValueExW 3273->3274 3279 40292e 3273->3279 3275 40256e RegCloseKey 3274->3275 3276 402568 3274->3276 3275->3279 3276->3275 3285 406484 wsprintfW 3276->3285 3281 402da6 17 API calls 3280->3281 3282 402dfd 3281->3282 3283 4063aa RegOpenKeyExW 3282->3283 3284 402534 3283->3284 3284->3272 3285->3275 4338 40202a 4339 402da6 17 API calls 4338->4339 4340 402031 4339->4340 4341 40690a 5 API calls 4340->4341 4342 402040 4341->4342 4343 40205c GlobalAlloc 4342->4343 4346 4020cc 4342->4346 4344 402070 4343->4344 4343->4346 4345 40690a 5 API calls 4344->4345 4347 402077 4345->4347 4348 40690a 5 API calls 4347->4348 4349 402081 4348->4349 4349->4346 4353 406484 wsprintfW 4349->4353 4351 4020ba 4354 406484 wsprintfW 4351->4354 4353->4351 4354->4346 4355 4021aa 4356 402da6 17 API calls 4355->4356 4357 4021b1 4356->4357 4358 402da6 17 API calls 4357->4358 4359 4021bb 4358->4359 4360 402da6 17 API calls 4359->4360 4361 4021c5 4360->4361 4362 402da6 17 API calls 4361->4362 4363 4021cf 4362->4363 4364 402da6 17 API calls 4363->4364 4365 4021d9 4364->4365 4366 402218 CoCreateInstance 4365->4366 4367 402da6 17 API calls 4365->4367 4370 402237 4366->4370 4367->4366 4368 401423 24 API calls 4369 4022f6 4368->4369 4370->4368 4370->4369 4371 403baa 4372 403bb5 4371->4372 4373 403bb9 4372->4373 4374 403bbc GlobalAlloc 4372->4374 4374->4373 3310 40352d SetErrorMode GetVersionExW 3311 4035b7 3310->3311 3312 40357f GetVersionExW 3310->3312 3313 403610 3311->3313 3314 40690a 5 API calls 3311->3314 3312->3311 3315 40689a 3 API calls 3313->3315 3314->3313 3316 403626 lstrlenA 3315->3316 3316->3313 3317 403636 3316->3317 3318 40690a 5 API calls 3317->3318 3319 40363d 3318->3319 3320 40690a 5 API calls 3319->3320 3321 403644 3320->3321 3322 40690a 5 API calls 3321->3322 3326 403650 #17 OleInitialize SHGetFileInfoW 3322->3326 3325 40369d GetCommandLineW 3401 40653d lstrcpynW 3325->3401 3400 40653d lstrcpynW 3326->3400 3328 4036af 3329 405e39 CharNextW 3328->3329 3330 4036d5 CharNextW 3329->3330 3342 4036e6 3330->3342 3331 4037e4 3332 4037f8 GetTempPathW 3331->3332 3402 4034fc 3332->3402 3334 403810 3336 403814 GetWindowsDirectoryW lstrcatW 3334->3336 3337 40386a DeleteFileW 3334->3337 3335 405e39 CharNextW 3335->3342 3338 4034fc 12 API calls 3336->3338 3412 40307d GetTickCount GetModuleFileNameW 3337->3412 3340 403830 3338->3340 3340->3337 3343 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3340->3343 3341 40387d 3345 403a59 ExitProcess CoUninitialize 3341->3345 3347 403932 3341->3347 3355 405e39 CharNextW 3341->3355 3342->3331 3342->3335 3344 4037e6 3342->3344 3346 4034fc 12 API calls 3343->3346 3496 40653d lstrcpynW 3344->3496 3349 403a69 3345->3349 3350 403a7e 3345->3350 3354 403862 3346->3354 3440 403bec 3347->3440 3501 405b9d 3349->3501 3352 403a86 GetCurrentProcess OpenProcessToken 3350->3352 3353 403afc ExitProcess 3350->3353 3358 403acc 3352->3358 3359 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 3352->3359 3354->3337 3354->3345 3369 40389f 3355->3369 3362 40690a 5 API calls 3358->3362 3359->3358 3360 403941 3360->3345 3365 403ad3 3362->3365 3363 403908 3366 405f14 18 API calls 3363->3366 3364 403949 3368 405b08 5 API calls 3364->3368 3367 403ae8 ExitWindowsEx 3365->3367 3371 403af5 3365->3371 3370 403914 3366->3370 3367->3353 3367->3371 3372 40394e lstrcatW 3368->3372 3369->3363 3369->3364 3370->3345 3497 40653d lstrcpynW 3370->3497 3505 40140b 3371->3505 3373 40396a lstrcatW lstrcmpiW 3372->3373 3374 40395f lstrcatW 3372->3374 3373->3360 3376 40398a 3373->3376 3374->3373 3378 403996 3376->3378 3379 40398f 3376->3379 3382 405aeb 2 API calls 3378->3382 3381 405a6e 4 API calls 3379->3381 3380 403927 3498 40653d lstrcpynW 3380->3498 3384 403994 3381->3384 3385 40399b SetCurrentDirectoryW 3382->3385 3384->3385 3386 4039b8 3385->3386 3387 4039ad 3385->3387 3500 40653d lstrcpynW 3386->3500 3499 40653d lstrcpynW 3387->3499 3390 40657a 17 API calls 3391 4039fa DeleteFileW 3390->3391 3392 403a06 CopyFileW 3391->3392 3397 4039c5 3391->3397 3392->3397 3393 403a50 3395 4062fd 36 API calls 3393->3395 3394 4062fd 36 API calls 3394->3397 3395->3360 3396 40657a 17 API calls 3396->3397 3397->3390 3397->3393 3397->3394 3397->3396 3398 405b20 2 API calls 3397->3398 3399 403a3a CloseHandle 3397->3399 3398->3397 3399->3397 3400->3325 3401->3328 3403 4067c4 5 API calls 3402->3403 3405 403508 3403->3405 3404 403512 3404->3334 3405->3404 3406 405e0c 3 API calls 3405->3406 3407 40351a 3406->3407 3408 405aeb 2 API calls 3407->3408 3409 403520 3408->3409 3508 40605c 3409->3508 3512 40602d GetFileAttributesW CreateFileW 3412->3512 3414 4030bd 3432 4030cd 3414->3432 3513 40653d lstrcpynW 3414->3513 3416 4030e3 3417 405e58 2 API calls 3416->3417 3418 4030e9 3417->3418 3514 40653d lstrcpynW 3418->3514 3420 4030f4 GetFileSize 3421 4031ee 3420->3421 3439 40310b 3420->3439 3515 403019 3421->3515 3423 4031f7 3425 403227 GlobalAlloc 3423->3425 3423->3432 3527 4034e5 SetFilePointer 3423->3527 3424 4034cf ReadFile 3424->3439 3526 4034e5 SetFilePointer 3425->3526 3427 40325a 3429 403019 6 API calls 3427->3429 3429->3432 3430 403210 3433 4034cf ReadFile 3430->3433 3431 403242 3434 4032b4 31 API calls 3431->3434 3432->3341 3435 40321b 3433->3435 3437 40324e 3434->3437 3435->3425 3435->3432 3436 403019 6 API calls 3436->3439 3437->3432 3437->3437 3438 40328b SetFilePointer 3437->3438 3438->3432 3439->3421 3439->3424 3439->3427 3439->3432 3439->3436 3441 40690a 5 API calls 3440->3441 3442 403c00 3441->3442 3443 403c06 3442->3443 3444 403c18 3442->3444 3543 406484 wsprintfW 3443->3543 3445 40640b 3 API calls 3444->3445 3446 403c48 3445->3446 3448 403c67 lstrcatW 3446->3448 3450 40640b 3 API calls 3446->3450 3449 403c16 3448->3449 3528 403ec2 3449->3528 3450->3448 3453 405f14 18 API calls 3454 403c99 3453->3454 3455 403d2d 3454->3455 3457 40640b 3 API calls 3454->3457 3456 405f14 18 API calls 3455->3456 3458 403d33 3456->3458 3459 403ccb 3457->3459 3460 403d43 LoadImageW 3458->3460 3461 40657a 17 API calls 3458->3461 3459->3455 3464 403cec lstrlenW 3459->3464 3467 405e39 CharNextW 3459->3467 3462 403de9 3460->3462 3463 403d6a RegisterClassW 3460->3463 3461->3460 3466 40140b 2 API calls 3462->3466 3465 403da0 SystemParametersInfoW CreateWindowExW 3463->3465 3495 403df3 3463->3495 3468 403d20 3464->3468 3469 403cfa lstrcmpiW 3464->3469 3465->3462 3473 403def 3466->3473 3471 403ce9 3467->3471 3470 405e0c 3 API calls 3468->3470 3469->3468 3472 403d0a GetFileAttributesW 3469->3472 3475 403d26 3470->3475 3471->3464 3476 403d16 3472->3476 3474 403ec2 18 API calls 3473->3474 3473->3495 3477 403e00 3474->3477 3544 40653d lstrcpynW 3475->3544 3476->3468 3479 405e58 2 API calls 3476->3479 3480 403e0c ShowWindow 3477->3480 3481 403e8f 3477->3481 3479->3468 3483 40689a 3 API calls 3480->3483 3536 405672 OleInitialize 3481->3536 3485 403e24 3483->3485 3484 403e95 3486 403eb1 3484->3486 3487 403e99 3484->3487 3488 403e32 GetClassInfoW 3485->3488 3490 40689a 3 API calls 3485->3490 3489 40140b 2 API calls 3486->3489 3493 40140b 2 API calls 3487->3493 3487->3495 3491 403e46 GetClassInfoW RegisterClassW 3488->3491 3492 403e5c DialogBoxParamW 3488->3492 3489->3495 3490->3488 3491->3492 3494 40140b 2 API calls 3492->3494 3493->3495 3494->3495 3495->3360 3496->3332 3497->3380 3498->3347 3499->3386 3500->3397 3502 405bb2 3501->3502 3503 403a76 ExitProcess 3502->3503 3504 405bc6 MessageBoxIndirectW 3502->3504 3504->3503 3506 401389 2 API calls 3505->3506 3507 401420 3506->3507 3507->3353 3509 406069 GetTickCount GetTempFileNameW 3508->3509 3510 40352b 3509->3510 3511 40609f 3509->3511 3510->3334 3511->3509 3511->3510 3512->3414 3513->3416 3514->3420 3516 403022 3515->3516 3517 40303a 3515->3517 3518 403032 3516->3518 3519 40302b DestroyWindow 3516->3519 3520 403042 3517->3520 3521 40304a GetTickCount 3517->3521 3518->3423 3519->3518 3522 406946 2 API calls 3520->3522 3523 403058 CreateDialogParamW ShowWindow 3521->3523 3524 40307b 3521->3524 3525 403048 3522->3525 3523->3524 3524->3423 3525->3423 3526->3431 3527->3430 3529 403ed6 3528->3529 3545 406484 wsprintfW 3529->3545 3531 403f47 3546 403f7b 3531->3546 3533 403c77 3533->3453 3534 403f4c 3534->3533 3535 40657a 17 API calls 3534->3535 3535->3534 3549 4044e5 3536->3549 3538 405695 3542 4056bc 3538->3542 3552 401389 3538->3552 3539 4044e5 SendMessageW 3540 4056ce OleUninitialize 3539->3540 3540->3484 3542->3539 3543->3449 3544->3455 3545->3531 3547 40657a 17 API calls 3546->3547 3548 403f89 SetWindowTextW 3547->3548 3548->3534 3550 4044fd 3549->3550 3551 4044ee SendMessageW 3549->3551 3550->3538 3551->3550 3554 401390 3552->3554 3553 4013fe 3553->3538 3554->3553 3555 4013cb MulDiv SendMessageW 3554->3555 3555->3554 4375 401a30 4376 402da6 17 API calls 4375->4376 4377 401a39 ExpandEnvironmentStringsW 4376->4377 4378 401a4d 4377->4378 4380 401a60 4377->4380 4379 401a52 lstrcmpW 4378->4379 4378->4380 4379->4380 4386 4023b2 4387 4023c0 4386->4387 4388 4023ba 4386->4388 4390 4023ce 4387->4390 4391 402da6 17 API calls 4387->4391 4389 402da6 17 API calls 4388->4389 4389->4387 4392 402da6 17 API calls 4390->4392 4394 4023dc 4390->4394 4391->4390 4392->4394 4393 402da6 17 API calls 4395 4023e5 WritePrivateProfileStringW 4393->4395 4394->4393 4396 402434 4397 402467 4396->4397 4398 40243c 4396->4398 4399 402da6 17 API calls 4397->4399 4400 402de6 17 API calls 4398->4400 4401 40246e 4399->4401 4402 402443 4400->4402 4407 402e64 4401->4407 4404 402da6 17 API calls 4402->4404 4405 40247b 4402->4405 4406 402454 RegDeleteValueW RegCloseKey 4404->4406 4406->4405 4408 402e71 4407->4408 4409 402e78 4407->4409 4408->4405 4409->4408 4411 402ea9 4409->4411 4412 4063aa RegOpenKeyExW 4411->4412 4413 402ed7 4412->4413 4414 402ee7 RegEnumValueW 4413->4414 4415 402f0a 4413->4415 4422 402f81 4413->4422 4414->4415 4416 402f71 RegCloseKey 4414->4416 4415->4416 4417 402f46 RegEnumKeyW 4415->4417 4418 402f4f RegCloseKey 4415->4418 4421 402ea9 6 API calls 4415->4421 4416->4422 4417->4415 4417->4418 4419 40690a 5 API calls 4418->4419 4420 402f5f 4419->4420 4420->4422 4423 402f63 RegDeleteKeyW 4420->4423 4421->4415 4422->4408 4423->4422 4424 401735 4425 402da6 17 API calls 4424->4425 4426 40173c SearchPathW 4425->4426 4427 401757 4426->4427 4428 401d38 4429 402d84 17 API calls 4428->4429 4430 401d3f 4429->4430 4431 402d84 17 API calls 4430->4431 4432 401d4b GetDlgItem 4431->4432 4433 402638 4432->4433 4434 4014b8 4435 4014be 4434->4435 4436 401389 2 API calls 4435->4436 4437 4014c6 4436->4437 4438 40263e 4439 402652 4438->4439 4440 40266d 4438->4440 4441 402d84 17 API calls 4439->4441 4442 402672 4440->4442 4443 40269d 4440->4443 4450 402659 4441->4450 4444 402da6 17 API calls 4442->4444 4445 402da6 17 API calls 4443->4445 4447 402679 4444->4447 4446 4026a4 lstrlenW 4445->4446 4446->4450 4455 40655f WideCharToMultiByte 4447->4455 4449 40268d lstrlenA 4449->4450 4451 4026d1 4450->4451 4452 4026e7 4450->4452 4454 40610e 5 API calls 4450->4454 4451->4452 4453 4060df WriteFile 4451->4453 4453->4452 4454->4451 4455->4449

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 0 40352d-40357d SetErrorMode GetVersionExW 1 4035b7-4035be 0->1 2 40357f-4035b3 GetVersionExW 0->2 3 4035c0 1->3 4 4035c8-403608 1->4 2->1 3->4 5 40360a-403612 call 40690a 4->5 6 40361b 4->6 5->6 11 403614 5->11 8 403620-403634 call 40689a lstrlenA 6->8 13 403636-403652 call 40690a * 3 8->13 11->6 20 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 13->20 21 403654-40365a 13->21 28 4036c7-4036c9 20->28 29 4036ce-4036e1 call 405e39 CharNextW 20->29 21->20 25 40365c 21->25 25->20 28->29 32 4037d8-4037de 29->32 33 4037e4 32->33 34 4036e6-4036ec 32->34 37 4037f8-403812 GetTempPathW call 4034fc 33->37 35 4036f5-4036fb 34->35 36 4036ee-4036f3 34->36 38 403702-403706 35->38 39 4036fd-403701 35->39 36->35 36->36 47 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 37->47 48 40386a-403882 DeleteFileW call 40307d 37->48 41 4037c6-4037d4 call 405e39 38->41 42 40370c-403712 38->42 39->38 41->32 59 4037d6-4037d7 41->59 45 403714-40371b 42->45 46 40372c-403765 42->46 52 403722 45->52 53 40371d-403720 45->53 54 403781-4037bb 46->54 55 403767-40376c 46->55 47->48 62 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 47->62 64 403888-40388e 48->64 65 403a59-403a67 ExitProcess CoUninitialize 48->65 52->46 53->46 53->52 57 4037c3-4037c5 54->57 58 4037bd-4037c1 54->58 55->54 61 40376e-403776 55->61 57->41 58->57 63 4037e6-4037f3 call 40653d 58->63 59->32 66 403778-40377b 61->66 67 40377d 61->67 62->48 62->65 63->37 69 403894-4038a7 call 405e39 64->69 70 403935-40393c call 403bec 64->70 72 403a69-403a78 call 405b9d ExitProcess 65->72 73 403a7e-403a84 65->73 66->54 66->67 67->54 88 4038f9-403906 69->88 89 4038a9-4038de 69->89 84 403941-403944 70->84 75 403a86-403a9b GetCurrentProcess OpenProcessToken 73->75 76 403afc-403b04 73->76 81 403acc-403ada call 40690a 75->81 82 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 75->82 85 403b06 76->85 86 403b09-403b0c ExitProcess 76->86 95 403ae8-403af3 ExitWindowsEx 81->95 96 403adc-403ae6 81->96 82->81 84->65 85->86 90 403908-403916 call 405f14 88->90 91 403949-40395d call 405b08 lstrcatW 88->91 93 4038e0-4038e4 89->93 90->65 106 40391c-403932 call 40653d * 2 90->106 104 40396a-403984 lstrcatW lstrcmpiW 91->104 105 40395f-403965 lstrcatW 91->105 98 4038e6-4038eb 93->98 99 4038ed-4038f5 93->99 95->76 102 403af5-403af7 call 40140b 95->102 96->95 96->102 98->99 100 4038f7 98->100 99->93 99->100 100->88 102->76 109 403a57 104->109 110 40398a-40398d 104->110 105->104 106->70 109->65 112 403996 call 405aeb 110->112 113 40398f-403994 call 405a6e 110->113 119 40399b-4039ab SetCurrentDirectoryW 112->119 113->119 121 4039b8-4039e4 call 40653d 119->121 122 4039ad-4039b3 call 40653d 119->122 126 4039e9-403a04 call 40657a DeleteFileW 121->126 122->121 129 403a44-403a4e 126->129 130 403a06-403a16 CopyFileW 126->130 129->126 132 403a50-403a52 call 4062fd 129->132 130->129 131 403a18-403a38 call 4062fd call 40657a call 405b20 130->131 131->129 140 403a3a-403a41 CloseHandle 131->140 132->109 140->129
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00008001), ref: 00403550
                                                                                                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 00403579
                                                                                                                                                                                                  • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                                                                                                                                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                                                                                                                                                                                  • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                                                                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 0040366A
                                                                                                                                                                                                  • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                                                                                                                                                                                  • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                                                                                                                                                                                  • CharNextW.USER32(00000000,00440000,00000020,00440000,00000000), ref: 004036D6
                                                                                                                                                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                                                                                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                                                                                                                                                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                                                                                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                                                                                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(1033), ref: 0040386F
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403956
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403965
                                                                                                                                                                                                    • Part of subcall function 00405AEB: CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403970
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00441800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 0040397C
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,?), ref: 004039FB
                                                                                                                                                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\Setup.exe,0042AA28,00000001), ref: 00403A0E
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                                                                                                                                                                                  • ExitProcess.KERNEL32(?), ref: 00403A59
                                                                                                                                                                                                  • CoUninitialize.COMBASE(?), ref: 00403A5E
                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403A78
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                                                                                                                                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403B0C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                                                                                                                                  • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nspF85F.tmp$C:\Users\user\Desktop\Setup.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                                                                                                                  • API String ID: 2292928366-3365535572
                                                                                                                                                                                                  • Opcode ID: a9950f16e1a4a62c6ded3d55c7a98e4382dcb346a085109a7b13f69721f27fd6
                                                                                                                                                                                                  • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a9950f16e1a4a62c6ded3d55c7a98e4382dcb346a085109a7b13f69721f27fd6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 141 4056de-4056f9 142 405888-40588f 141->142 143 4056ff-4057c6 GetDlgItem * 3 call 4044ce call 404e27 GetClientRect GetSystemMetrics SendMessageW * 2 141->143 145 405891-4058b3 GetDlgItem CreateThread CloseHandle 142->145 146 4058b9-4058c6 142->146 165 4057e4-4057e7 143->165 166 4057c8-4057e2 SendMessageW * 2 143->166 145->146 148 4058e4-4058ee 146->148 149 4058c8-4058ce 146->149 150 4058f0-4058f6 148->150 151 405944-405948 148->151 153 4058d0-4058df ShowWindow * 2 call 4044ce 149->153 154 405909-405912 call 404500 149->154 155 4058f8-405904 call 404472 150->155 156 40591e-40592e ShowWindow 150->156 151->154 159 40594a-405950 151->159 153->148 162 405917-40591b 154->162 155->154 163 405930-405939 call 40559f 156->163 164 40593e-40593f call 404472 156->164 159->154 167 405952-405965 SendMessageW 159->167 163->164 164->151 170 4057f7-40580e call 404499 165->170 171 4057e9-4057f5 SendMessageW 165->171 166->165 172 405a67-405a69 167->172 173 40596b-405996 CreatePopupMenu call 40657a AppendMenuW 167->173 180 405810-405824 ShowWindow 170->180 181 405844-405865 GetDlgItem SendMessageW 170->181 171->170 172->162 178 405998-4059a8 GetWindowRect 173->178 179 4059ab-4059c0 TrackPopupMenu 173->179 178->179 179->172 182 4059c6-4059dd 179->182 183 405833 180->183 184 405826-405831 ShowWindow 180->184 181->172 185 40586b-405883 SendMessageW * 2 181->185 186 4059e2-4059fd SendMessageW 182->186 187 405839-40583f call 4044ce 183->187 184->187 185->172 186->186 188 4059ff-405a22 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 186->188 187->181 190 405a24-405a4b SendMessageW 188->190 190->190 191 405a4d-405a61 GlobalUnlock SetClipboardData CloseClipboard 190->191 191->172
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 0040573C
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00405788
                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000002), ref: 0040578F
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 0040582B
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                                                                                                                                                                                                    • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004058B3
                                                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004058D7
                                                                                                                                                                                                  • ShowWindow.USER32(0003044A,00000008), ref: 004058DC
                                                                                                                                                                                                  • ShowWindow.USER32(00000008), ref: 00405926
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 0040596B
                                                                                                                                                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 0040599F
                                                                                                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                                                                                                                                                                                  • OpenClipboard.USER32(00000000), ref: 00405A00
                                                                                                                                                                                                  • EmptyClipboard.USER32 ref: 00405A06
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                                                                                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00405A61
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                                                  • String ID: {
                                                                                                                                                                                                  • API String ID: 590372296-366298937
                                                                                                                                                                                                  • Opcode ID: c8ef7bbbe888f33c7642292c9829dc0fe895fcac448e4408b73d3b9779d96911
                                                                                                                                                                                                  • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c8ef7bbbe888f33c7642292c9829dc0fe895fcac448e4408b73d3b9779d96911
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 498 405c49-405c6f call 405f14 501 405c71-405c83 DeleteFileW 498->501 502 405c88-405c8f 498->502 503 405e05-405e09 501->503 504 405c91-405c93 502->504 505 405ca2-405cb2 call 40653d 502->505 506 405db3-405db8 504->506 507 405c99-405c9c 504->507 513 405cc1-405cc2 call 405e58 505->513 514 405cb4-405cbf lstrcatW 505->514 506->503 509 405dba-405dbd 506->509 507->505 507->506 511 405dc7-405dcf call 406873 509->511 512 405dbf-405dc5 509->512 511->503 522 405dd1-405de5 call 405e0c call 405c01 511->522 512->503 516 405cc7-405ccb 513->516 514->516 518 405cd7-405cdd lstrcatW 516->518 519 405ccd-405cd5 516->519 521 405ce2-405cfe lstrlenW FindFirstFileW 518->521 519->518 519->521 523 405d04-405d0c 521->523 524 405da8-405dac 521->524 538 405de7-405dea 522->538 539 405dfd-405e00 call 40559f 522->539 526 405d2c-405d40 call 40653d 523->526 527 405d0e-405d16 523->527 524->506 529 405dae 524->529 540 405d42-405d4a 526->540 541 405d57-405d62 call 405c01 526->541 530 405d18-405d20 527->530 531 405d8b-405d9b FindNextFileW 527->531 529->506 530->526 534 405d22-405d2a 530->534 531->523 537 405da1-405da2 FindClose 531->537 534->526 534->531 537->524 538->512 544 405dec-405dfb call 40559f call 4062fd 538->544 539->503 540->531 545 405d4c-405d55 call 405c49 540->545 549 405d83-405d86 call 40559f 541->549 550 405d64-405d67 541->550 544->503 545->531 549->531 553 405d69-405d79 call 40559f call 4062fd 550->553 554 405d7b-405d81 550->554 553->531 554->531
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBA
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CDD
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*,?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                                                                                                                                                                                                  • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00405DA2
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                  • String ID: .$.$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\*.*$\*.*
                                                                                                                                                                                                  • API String ID: 2035342205-3594396184
                                                                                                                                                                                                  • Opcode ID: d4824498ca5d4646401654330336f54dc3516ea2401a274e156101c2699109e4
                                                                                                                                                                                                  • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d4824498ca5d4646401654330336f54dc3516ea2401a274e156101c2699109e4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,004302B8,C:\,00405F5D,C:\,C:\,00000000,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040688A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                                                  • String ID: C:\
                                                                                                                                                                                                  • API String ID: 2295610775-3404278061
                                                                                                                                                                                                  • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                                                                                                                                                  • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 192 403f9a-403fac 193 403fb2-403fb8 192->193 194 404113-404122 192->194 193->194 195 403fbe-403fc7 193->195 196 404171-404186 194->196 197 404124-40416c GetDlgItem * 2 call 404499 SetClassLongW call 40140b 194->197 200 403fc9-403fd6 SetWindowPos 195->200 201 403fdc-403fe3 195->201 198 4041c6-4041cb call 4044e5 196->198 199 404188-40418b 196->199 197->196 214 4041d0-4041eb 198->214 203 40418d-404198 call 401389 199->203 204 4041be-4041c0 199->204 200->201 206 403fe5-403fff ShowWindow 201->206 207 404027-40402d 201->207 203->204 228 40419a-4041b9 SendMessageW 203->228 204->198 213 404466 204->213 215 404100-40410e call 404500 206->215 216 404005-404018 GetWindowLongW 206->216 209 404046-404049 207->209 210 40402f-404041 DestroyWindow 207->210 220 40404b-404057 SetWindowLongW 209->220 221 40405c-404062 209->221 217 404443-404449 210->217 219 404468-40446f 213->219 224 4041f4-4041fa 214->224 225 4041ed-4041ef call 40140b 214->225 215->219 216->215 226 40401e-404021 ShowWindow 216->226 217->213 231 40444b-404451 217->231 220->219 221->215 227 404068-404077 GetDlgItem 221->227 232 404200-40420b 224->232 233 404424-40443d DestroyWindow KiUserCallbackDispatcher 224->233 225->224 226->207 235 404096-404099 227->235 236 404079-404090 SendMessageW IsWindowEnabled 227->236 228->219 231->213 237 404453-40445c ShowWindow 231->237 232->233 234 404211-40425e call 40657a call 404499 * 3 GetDlgItem 232->234 233->217 264 404260-404265 234->264 265 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb KiUserCallbackDispatcher 234->265 239 40409b-40409c 235->239 240 40409e-4040a1 235->240 236->213 236->235 237->213 242 4040cc-4040d1 call 404472 239->242 243 4040a3-4040a9 240->243 244 4040af-4040b4 240->244 242->215 247 4040ea-4040fa SendMessageW 243->247 248 4040ab-4040ad 243->248 244->247 249 4040b6-4040bc 244->249 247->215 248->242 252 4040d3-4040dc call 40140b 249->252 253 4040be-4040c4 call 40140b 249->253 252->215 262 4040de-4040e8 252->262 260 4040ca 253->260 260->242 262->260 264->265 268 4042a6-4042a7 265->268 269 4042a9 265->269 270 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 268->270 269->270 271 4042db-4042ec SendMessageW 270->271 272 4042ee 270->272 273 4042f4-404333 call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 271->273 272->273 273->214 284 404339-40433b 273->284 284->214 285 404341-404345 284->285 286 404364-404378 DestroyWindow 285->286 287 404347-40434d 285->287 286->217 289 40437e-4043ab CreateDialogParamW 286->289 287->213 288 404353-404359 287->288 288->214 290 40435f 288->290 289->217 291 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 289->291 290->213 291->213 296 40440a-40441d ShowWindow call 4044e5 291->296 298 404422 296->298 298->217
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                                                                                                                                                                                  • ShowWindow.USER32(?), ref: 00403FF6
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 00404021
                                                                                                                                                                                                  • DestroyWindow.USER32 ref: 00404035
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                                                                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 0040406D
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                                                                                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 00404088
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00404133
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 0040413D
                                                                                                                                                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                                                                                                                                                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 0040424E
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 0040426F
                                                                                                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                                                                                                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040429C
                                                                                                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                                                                                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 004042B9
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                                                                                                                                                                                  • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                                                                                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 00404456
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Item$MessageSendShow$Long$CallbackDispatcherMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3964124867-0
                                                                                                                                                                                                  • Opcode ID: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                                                                                                                                                  • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 299 403bec-403c04 call 40690a 302 403c06-403c16 call 406484 299->302 303 403c18-403c4f call 40640b 299->303 312 403c72-403c9b call 403ec2 call 405f14 302->312 308 403c51-403c62 call 40640b 303->308 309 403c67-403c6d lstrcatW 303->309 308->309 309->312 317 403ca1-403ca6 312->317 318 403d2d-403d35 call 405f14 312->318 317->318 319 403cac-403cd4 call 40640b 317->319 324 403d43-403d68 LoadImageW 318->324 325 403d37-403d3e call 40657a 318->325 319->318 326 403cd6-403cda 319->326 328 403de9-403df1 call 40140b 324->328 329 403d6a-403d9a RegisterClassW 324->329 325->324 330 403cec-403cf8 lstrlenW 326->330 331 403cdc-403ce9 call 405e39 326->331 343 403df3-403df6 328->343 344 403dfb-403e06 call 403ec2 328->344 332 403da0-403de4 SystemParametersInfoW CreateWindowExW 329->332 333 403eb8 329->333 337 403d20-403d28 call 405e0c call 40653d 330->337 338 403cfa-403d08 lstrcmpiW 330->338 331->330 332->328 336 403eba-403ec1 333->336 337->318 338->337 342 403d0a-403d14 GetFileAttributesW 338->342 347 403d16-403d18 342->347 348 403d1a-403d1b call 405e58 342->348 343->336 352 403e0c-403e26 ShowWindow call 40689a 344->352 353 403e8f-403e90 call 405672 344->353 347->337 347->348 348->337 360 403e32-403e44 GetClassInfoW 352->360 361 403e28-403e2d call 40689a 352->361 356 403e95-403e97 353->356 358 403eb1-403eb3 call 40140b 356->358 359 403e99-403e9f 356->359 358->333 359->343 362 403ea5-403eac call 40140b 359->362 365 403e46-403e56 GetClassInfoW RegisterClassW 360->365 366 403e5c-403e7f DialogBoxParamW call 40140b 360->366 361->360 362->343 365->366 370 403e84-403e8d call 403b3c 366->370 370->336
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                                                                                                                                                    • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                                                                                                                                                  • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76233420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403C6D
                                                                                                                                                                                                  • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76233420), ref: 00403CED
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(Remove folder: ,?,00000000,?), ref: 00403D0B
                                                                                                                                                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00440800), ref: 00403D54
                                                                                                                                                                                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                  • RegisterClassW.USER32(00433EA0), ref: 00403D91
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                                                                                                                                                                                                  • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                                                                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                                                                                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                                                                                                                                                                                                  • RegisterClassW.USER32(00433EA0), ref: 00403E56
                                                                                                                                                                                                  • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                  • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                                                                                  • API String ID: 1975747703-3587615903
                                                                                                                                                                                                  • Opcode ID: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                                                                                                                                                  • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 373 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 376 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 373->376 377 4030cd-4030d2 373->377 385 4031f0-4031fe call 403019 376->385 386 40310b 376->386 378 4032ad-4032b1 377->378 392 403200-403203 385->392 393 403253-403258 385->393 388 403110-403127 386->388 390 403129 388->390 391 40312b-403134 call 4034cf 388->391 390->391 399 40325a-403262 call 403019 391->399 400 40313a-403141 391->400 395 403205-40321d call 4034e5 call 4034cf 392->395 396 403227-403251 GlobalAlloc call 4034e5 call 4032b4 392->396 393->378 395->393 419 40321f-403225 395->419 396->393 424 403264-403275 396->424 399->393 404 403143-403157 call 405fe8 400->404 405 4031bd-4031c1 400->405 410 4031cb-4031d1 404->410 422 403159-403160 404->422 409 4031c3-4031ca call 403019 405->409 405->410 409->410 415 4031e0-4031e8 410->415 416 4031d3-4031dd call 4069f7 410->416 415->388 423 4031ee 415->423 416->415 419->393 419->396 422->410 428 403162-403169 422->428 423->385 425 403277 424->425 426 40327d-403282 424->426 425->426 429 403283-403289 426->429 428->410 430 40316b-403172 428->430 429->429 431 40328b-4032a6 SetFilePointer call 405fe8 429->431 430->410 432 403174-40317b 430->432 436 4032ab 431->436 432->410 433 40317d-40319d 432->433 433->393 435 4031a3-4031a7 433->435 437 4031a9-4031ad 435->437 438 4031af-4031b7 435->438 436->378 437->423 437->438 438->410 439 4031b9-4031bb 438->439 439->410
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 0040308E
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Setup.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                                                                                                                                                                                    • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                    • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,00441800,00441800,C:\Users\user\Desktop\Setup.exe,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\Setup.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                                                                                                                                                                                  • API String ID: 2803837635-2477270287
                                                                                                                                                                                                  • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                                                                                                                                                  • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 440 40657a-406585 441 406587-406596 440->441 442 406598-4065ae 440->442 441->442 443 4065b0-4065bd 442->443 444 4065c6-4065cf 442->444 443->444 445 4065bf-4065c2 443->445 446 4065d5 444->446 447 4067aa-4067b5 444->447 445->444 448 4065da-4065e7 446->448 449 4067c0-4067c1 447->449 450 4067b7-4067bb call 40653d 447->450 448->447 451 4065ed-4065f6 448->451 450->449 453 406788 451->453 454 4065fc-406639 451->454 457 406796-406799 453->457 458 40678a-406794 453->458 455 40672c-406731 454->455 456 40663f-406646 454->456 462 406733-406739 455->462 463 406764-406769 455->463 459 406648-40664a 456->459 460 40664b-40664d 456->460 461 40679b-4067a4 457->461 458->461 459->460 464 40668a-40668d 460->464 465 40664f-406676 call 40640b 460->465 461->447 468 4065d7 461->468 469 406749-406755 call 40653d 462->469 470 40673b-406747 call 406484 462->470 466 406778-406786 lstrlenW 463->466 467 40676b-406773 call 40657a 463->467 474 40669d-4066a0 464->474 475 40668f-40669b GetSystemDirectoryW 464->475 485 406713-406717 465->485 486 40667c-406685 call 40657a 465->486 466->461 467->466 468->448 478 40675a-406760 469->478 470->478 481 4066a2-4066b0 GetWindowsDirectoryW 474->481 482 406709-40670b 474->482 480 40670d-406711 475->480 478->466 483 406762 478->483 480->485 487 406724-40672a call 4067c4 480->487 481->482 482->480 484 4066b2-4066ba 482->484 483->487 491 4066d1-4066e7 SHGetSpecialFolderLocation 484->491 492 4066bc-4066c5 484->492 485->487 488 406719-40671f lstrcatW 485->488 486->480 487->466 488->487 493 406705 491->493 494 4066e9-406703 SHGetPathFromIDListW CoTaskMemFree 491->494 497 4066cd-4066cf 492->497 493->482 494->480 494->493 497->480 497->491
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 00406695
                                                                                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00000000,00424420,762323A0), ref: 004066A8
                                                                                                                                                                                                  • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                  • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspF85F.tmp$Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                                                  • API String ID: 4260037668-216340664
                                                                                                                                                                                                  • Opcode ID: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                                                                                                                                                  • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 562 4032b4-4032cb 563 4032d4-4032dd 562->563 564 4032cd 562->564 565 4032e6-4032eb 563->565 566 4032df 563->566 564->563 567 4032fb-403308 call 4034cf 565->567 568 4032ed-4032f6 call 4034e5 565->568 566->565 572 4034bd 567->572 573 40330e-403312 567->573 568->567 574 4034bf-4034c0 572->574 575 403468-40346a 573->575 576 403318-403361 GetTickCount 573->576 579 4034c8-4034cc 574->579 577 4034aa-4034ad 575->577 578 40346c-40346f 575->578 580 4034c5 576->580 581 403367-40336f 576->581 585 4034b2-4034bb call 4034cf 577->585 586 4034af 577->586 578->580 582 403471 578->582 580->579 583 403371 581->583 584 403374-403382 call 4034cf 581->584 588 403474-40347a 582->588 583->584 584->572 596 403388-403391 584->596 585->572 594 4034c2 585->594 586->585 591 40347c 588->591 592 40347e-40348c call 4034cf 588->592 591->592 592->572 599 40348e-40349a call 4060df 592->599 594->580 598 403397-4033b7 call 406a65 596->598 604 403460-403462 598->604 605 4033bd-4033d0 GetTickCount 598->605 606 403464-403466 599->606 607 40349c-4034a6 599->607 604->574 608 4033d2-4033da 605->608 609 40341b-40341d 605->609 606->574 607->588 614 4034a8 607->614 610 4033e2-403418 MulDiv wsprintfW call 40559f 608->610 611 4033dc-4033e0 608->611 612 403454-403458 609->612 613 40341f-403423 609->613 610->609 611->609 611->610 612->581 618 40345e 612->618 616 403425-40342c call 4060df 613->616 617 40343a-403445 613->617 614->580 622 403431-403433 616->622 621 403448-40344c 617->621 618->580 621->598 623 403452 621->623 622->606 624 403435-403438 622->624 623->580 624->621
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CountTick$wsprintf
                                                                                                                                                                                                  • String ID: *B$ DB$ A$ A$... %d%%$tClientRect$}8@
                                                                                                                                                                                                  • API String ID: 551687249-400812307
                                                                                                                                                                                                  • Opcode ID: 3bb00b159343602b5baf8216f2e6fd7ccfc314744640e4b330e170589aabe739
                                                                                                                                                                                                  • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3bb00b159343602b5baf8216f2e6fd7ccfc314744640e4b330e170589aabe739
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 625 40176f-401794 call 402da6 call 405e83 630 401796-40179c call 40653d 625->630 631 40179e-4017b0 call 40653d call 405e0c lstrcatW 625->631 636 4017b5-4017b6 call 4067c4 630->636 631->636 640 4017bb-4017bf 636->640 641 4017c1-4017cb call 406873 640->641 642 4017f2-4017f5 640->642 649 4017dd-4017ef 641->649 650 4017cd-4017db CompareFileTime 641->650 643 4017f7-4017f8 call 406008 642->643 644 4017fd-401819 call 40602d 642->644 643->644 652 40181b-40181e 644->652 653 40188d-4018b6 call 40559f call 4032b4 644->653 649->642 650->649 654 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 652->654 655 40186f-401879 call 40559f 652->655 665 4018b8-4018bc 653->665 666 4018be-4018ca SetFileTime 653->666 654->640 687 401864-401865 654->687 667 401882-401888 655->667 665->666 669 4018d0-4018db CloseHandle 665->669 666->669 670 402c33 667->670 673 4018e1-4018e4 669->673 674 402c2a-402c2d 669->674 675 402c35-402c39 670->675 677 4018e6-4018f7 call 40657a lstrcatW 673->677 678 4018f9-4018fc call 40657a 673->678 674->670 684 401901-4023a2 call 405b9d 677->684 678->684 684->674 684->675 687->667 689 401867-401868 687->689 689->655
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrcatW.KERNEL32(00000000,00000000,get,00441000,?,?,00000031), ref: 004017B0
                                                                                                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00441000,?,?,00000031), ref: 004017D5
                                                                                                                                                                                                    • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0), ref: 004055FA
                                                                                                                                                                                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\), ref: 0040560C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp$C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dll$get
                                                                                                                                                                                                  • API String ID: 1941528284-3961003571
                                                                                                                                                                                                  • Opcode ID: f7e64eeb5d3c4bf8a05a3440747446d68def3c8d7aa8c7c6583b7de4a42550af
                                                                                                                                                                                                  • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f7e64eeb5d3c4bf8a05a3440747446d68def3c8d7aa8c7c6583b7de4a42550af
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 691 40559f-4055b4 692 4055ba-4055cb 691->692 693 40566b-40566f 691->693 694 4055d6-4055e2 lstrlenW 692->694 695 4055cd-4055d1 call 40657a 692->695 697 4055e4-4055f4 lstrlenW 694->697 698 4055ff-405603 694->698 695->694 697->693 699 4055f6-4055fa lstrcatW 697->699 700 405612-405616 698->700 701 405605-40560c SetWindowTextW 698->701 699->698 702 405618-40565a SendMessageW * 3 700->702 703 40565c-40565e 700->703 701->700 702->703 703->693 704 405660-405663 703->704 704->693
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                  • lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                  • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0), ref: 004055FA
                                                                                                                                                                                                  • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\), ref: 0040560C
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                                                                                                                                  • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\
                                                                                                                                                                                                  • API String ID: 1495540970-2643667379
                                                                                                                                                                                                  • Opcode ID: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                                                                                                                                                  • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 705 4026ec-402705 call 402d84 708 402c2a-402c2d 705->708 709 40270b-402712 705->709 710 402c33-402c39 708->710 711 402714 709->711 712 402717-40271a 709->712 711->712 713 402720-40272f call 40649d 712->713 714 40287e-402886 712->714 713->714 718 402735 713->718 714->708 719 40273b-40273f 718->719 720 4027d4-4027d7 719->720 721 402745-402760 ReadFile 719->721 723 4027d9-4027dc 720->723 724 4027ef-4027ff call 4060b0 720->724 721->714 722 402766-40276b 721->722 722->714 726 402771-40277f 722->726 723->724 727 4027de-4027e9 call 40610e 723->727 724->714 733 402801 724->733 730 402785-402797 MultiByteToWideChar 726->730 731 40283a-402846 call 406484 726->731 727->714 727->724 730->733 734 402799-40279c 730->734 731->710 736 402804-402807 733->736 737 40279e-4027a9 734->737 736->731 739 402809-40280e 736->739 737->736 740 4027ab-4027d0 SetFilePointer MultiByteToWideChar 737->740 741 402810-402815 739->741 742 40284b-40284f 739->742 740->737 743 4027d2 740->743 741->742 746 402817-40282a 741->746 744 402851-402855 742->744 745 40286c-402878 SetFilePointer 742->745 743->733 747 402857-40285b 744->747 748 40285d-40286a 744->748 745->714 746->714 749 40282c-402832 746->749 747->745 747->748 748->714 749->719 750 402838 749->750 750->714
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                                                                                                                    • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                                                  • String ID: 9
                                                                                                                                                                                                  • API String ID: 163830602-2366072709
                                                                                                                                                                                                  • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                                                                                                                                                  • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 751 40689a-4068ba GetSystemDirectoryW 752 4068bc 751->752 753 4068be-4068c0 751->753 752->753 754 4068d1-4068d3 753->754 755 4068c2-4068cb 753->755 757 4068d4-406907 wsprintfW LoadLibraryExW 754->757 755->754 756 4068cd-4068cf 755->756 756->757
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 004068EC
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                                                  • String ID: %s%S.dll$UXTHEME$\
                                                                                                                                                                                                  • API String ID: 2200240437-1946221925
                                                                                                                                                                                                  • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                                                                                                  • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 758 405f14-405f2f call 40653d call 405eb7 763 405f31-405f33 758->763 764 405f35-405f42 call 4067c4 758->764 765 405f8d-405f8f 763->765 768 405f52-405f56 764->768 769 405f44-405f4a 764->769 770 405f6c-405f75 lstrlenW 768->770 769->763 771 405f4c-405f50 769->771 772 405f77-405f8b call 405e0c GetFileAttributesW 770->772 773 405f58-405f5f call 406873 770->773 771->763 771->768 772->765 778 405f61-405f64 773->778 779 405f66-405f67 call 405e58 773->779 778->763 778->779 779->770
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                  • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                                                  • String ID: 4#v$C:\$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 3248276644-1150081906
                                                                                                                                                                                                  • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                                                                                                                                                  • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 781 405a6e-405ab9 CreateDirectoryW 782 405abb-405abd 781->782 783 405abf-405acc GetLastError 781->783 784 405ae6-405ae8 782->784 783->784 785 405ace-405ae2 SetFileSecurityW 783->785 785->782 786 405ae4 GetLastError 785->786 786->784
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405AC5
                                                                                                                                                                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405AE4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 3449924974-3936084776
                                                                                                                                                                                                  • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                                                                                                  • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 787 401d81-401d85 788 401d94-401d9a GetDlgItem 787->788 789 401d87-401d92 call 402d84 787->789 790 401da0-401dcc 788->790 789->790 793 401dd7 790->793 794 401dce-401dd5 call 402da6 790->794 796 401ddb-401e31 GetClientRect LoadImageW SendMessageW 793->796 794->796 798 401e33-401e36 796->798 799 401e3f-401e42 796->799 798->799 800 401e38-401e39 DeleteObject 798->800 801 401e48 799->801 802 402c2a-402c39 799->802 800->799 801->802
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                                                                                                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1849352358-0
                                                                                                                                                                                                  • Opcode ID: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                                                                                                                                                  • Instruction ID: b69f8f45c5cbb28dd5603d9b1d667d2ce3d3910c133b75fee4ecc707c572ca23
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3321F672904119AFCB05DBA4DE45AEEBBB5EF08314F14003AFA45F62A0DB389951DB98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                                                                                                  • String ID: !
                                                                                                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                                                                                                  • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                                                                                                                                                  • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnD97C.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                                                                                                                                                  • RegSetValueExW.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp,00000000,00000011,00000002), ref: 00402515
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseValuelstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp
                                                                                                                                                                                                  • API String ID: 2655323295-1608716440
                                                                                                                                                                                                  • Opcode ID: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                                                                                                                                                  • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 0040607A
                                                                                                                                                                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                                                  • API String ID: 1716503409-1857211195
                                                                                                                                                                                                  • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                                                                                                  • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,76233420,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00403B78
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Free$GlobalLibrary
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 1100898210-3936084776
                                                                                                                                                                                                  • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                                                                                                                                                  • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0), ref: 004055FA
                                                                                                                                                                                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\), ref: 0040560C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 334405425-0
                                                                                                                                                                                                  • Opcode ID: 0bf0e5e813b2564cc7cfb612efcde4c797e71ce7d2922b3564d4c07743ad1514
                                                                                                                                                                                                  • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0bf0e5e813b2564cc7cfb612efcde4c797e71ce7d2922b3564d4c07743ad1514
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GlobalFree.KERNEL32(02C16DB0), ref: 00401C0B
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C1D
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Global$AllocFreelstrcatlstrlen
                                                                                                                                                                                                  • String ID: get
                                                                                                                                                                                                  • API String ID: 3292104215-4248514160
                                                                                                                                                                                                  • Opcode ID: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                                                                                                                                                  • Instruction ID: 7c0f58a685d1fc6dd3685da305ee1819882fb4420ac17dc2787245939102450a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B21D872904210EBDB20AFA8EE84A5E73B4EB04715755063BF552F72D0D7B8AC414B9D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Enum$CloseValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 397863658-0
                                                                                                                                                                                                  • Opcode ID: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                                                                                                                                                  • Instruction ID: 08080f496e1fbaad801da7c4a2f11cdf7a22a5a493a276a89d416976773fa01e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 89017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61C0EBB85E44966D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00406008: GetFileAttributesW.KERNEL32(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                                                                                                                                                                                    • Part of subcall function 00406008: SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                                                                                                                                                                                  • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405DE3), ref: 00405C1C
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,00405DE3), ref: 00405C24
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C3C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Attributes$DeleteDirectoryRemove
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1655745494-0
                                                                                                                                                                                                  • Opcode ID: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                                                                                                                                                                                  • Instruction ID: 0274c5225d47ddc366315f3a2fda4b694ad97aa72442a0e2fcdbaf00fd257d87
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F4E0E53110CF9156E61457309E08F5F2AD8EF86715F05493EF892B10C0CBB848068E6A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000408,?,00000000,004040D1), ref: 00404490
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID: x
                                                                                                                                                                                                  • API String ID: 3850602802-2363233923
                                                                                                                                                                                                  • Opcode ID: 6afabcb65d7cd0472edcecb82606307073186cf957424f1b3ed57c3b76b5cfb8
                                                                                                                                                                                                  • Instruction ID: 1b38e0d23eed931a714c5b599c5829f4d2050063c4158495342b67dc2c27a344
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6afabcb65d7cd0472edcecb82606307073186cf957424f1b3ed57c3b76b5cfb8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 10C01271140200EACB004B00DE01F0A7A20B7A0B02F209039F381210B087B05422DB0C
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                                                                                                                    • Part of subcall function 00405A6E: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,00441000,?,00000000,000000F0), ref: 0040164D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1892508949-0
                                                                                                                                                                                                  • Opcode ID: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                                                                                                                                                  • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnD97C.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseQueryValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3356406503-0
                                                                                                                                                                                                  • Opcode ID: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                                                                                                                                                  • Instruction ID: 3e5dab0bbcc9b7b4348569693e39c51bc0b27c59e8ea0ed6abb05ebc10b9b344
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F116D71900219EADF14DFA4DA589AE77B4FF04345B20443BE401B62C0E7B88A45EB5D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00405B63: ShellExecuteExW.SHELL32(?), ref: 00405B72
                                                                                                                                                                                                    • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                                                                                                                                                    • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 165873841-2766056989
                                                                                                                                                                                                  • Opcode ID: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                                                                                                                                                  • Instruction ID: 706d8f23dd4fc365793d21c3b3cee38f3579e955c6bce5a1691758ef83551cc9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20115B71E042189ADB50EFB9CA49B8CB6F4BF04304F24447AE405F72C1EBBC89459B18
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                  • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                                                                                                                                                  • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                                                                                                                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$EnableShow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1136574915-0
                                                                                                                                                                                                  • Opcode ID: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                                                                                                                                                  • Instruction ID: ff95e9915c8c9942b49c08d49a5710ecdabad47c7be9b03b7ba0a01474a23479
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E7E04872908211CFE705EBA4EE495AD77F4EF40325710497FE501F11D1DBB55D00965D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00405B56
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3712363035-0
                                                                                                                                                                                                  • Opcode ID: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                                                                                                                                                                                  • Instruction ID: 0547baa0b497a95b6ed0e8f273b1969b1ac2c9598ef2001c301bcde660c6e2d6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3EE092B4600209BFEB10AB64AE49F7B7AACEB04704F004565BA51E61A1DB78E8158A78
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                                                                                                                                                    • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                                                                                                                                                    • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                                                                                                                                                                                                    • Part of subcall function 0040689A: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2547128583-0
                                                                                                                                                                                                  • Opcode ID: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                                                                                                  • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000B,00000001), ref: 00402C14
                                                                                                                                                                                                  • InvalidateRect.USER32(?), ref: 00402C24
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InvalidateMessageRectSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 909852535-0
                                                                                                                                                                                                  • Opcode ID: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                                                                                                                                                  • Instruction ID: 5efb85e177e5feb05262591b5578bbf68be0fc1facb886aaf0ec985341d6bcc2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CEE08C72700008FFEB01CBA4EE84DAEB779FB40315B00007AF502A00A0D7300D40DA28
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$AttributesCreate
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 415043291-0
                                                                                                                                                                                                  • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                                                                                                  • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AttributesFile
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3188754299-0
                                                                                                                                                                                                  • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                  • Instruction ID: c979a2e86073268fb5c10017c0603d576bb262e7e1663e1e1b2ee048d1a5e24b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34D012725041316FC2102728EF0C89BBF55EF643717014B35F9A5A22F0CB304C638A98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNEL32(FFFFFFFF,00403A5E,?), ref: 00403B1D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\, xrefs: 00403B31
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\
                                                                                                                                                                                                  • API String ID: 2962429428-1314130484
                                                                                                                                                                                                  • Opcode ID: e86ec88962d2cddd060eb64ec5e150871475ae72b9f2b14f7d4b77a190cc5563
                                                                                                                                                                                                  • Instruction ID: 74b342ff74dc5917d60848dc34610585f5de2c5243f802b65b47dd8438b48b4d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e86ec88962d2cddd060eb64ec5e150871475ae72b9f2b14f7d4b77a190cc5563
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5EC0123050470056D1646F749E4FE153B64AB4073EB600325B0F9B10F1CB3C5759895D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405AFF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1375471231-0
                                                                                                                                                                                                  • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                                                                                                  • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(00000000,?,00000000,?,?), ref: 004028AF
                                                                                                                                                                                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FilePointerwsprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 327478801-0
                                                                                                                                                                                                  • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                                                                                                                                                  • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 00406401
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Create
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2289755597-0
                                                                                                                                                                                                  • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                  • Instruction ID: ccab944935cfefb85f0e849ce69279fb55db75a3b7fb0960311cd9d36817041a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 04E0E6B2010109BFEF095F90DC0AD7B3B1DE704300F01892EFD06D4091E6B5AD306675
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileWrite
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3934441357-0
                                                                                                                                                                                                  • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                  • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                                                                                  • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                  • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegOpenKeyExW.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,00406438,?,00000000,?,?,Remove folder: ,?), ref: 004063CE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Open
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 71445658-0
                                                                                                                                                                                                  • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                  • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,?,00000000), ref: 004044B3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ItemTextlstrcatlstrlen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 281422827-0
                                                                                                                                                                                                  • Opcode ID: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                                                                                                                                                  • Instruction ID: 6ac98b26730712a62f5b3967fa7f39b4c61dbbfa6ef1674fce18da22a1fc1fc0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D3C08C35008200BFD641A714EC42F0FB7A8FFA031AF00C42EB05CA10D1C63494208A2A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00020442,00000000,00000000,00000000), ref: 004044F7
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                  • Opcode ID: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                                                                                                                                                                                  • Instruction ID: 729772cd993a62bf3dcd5a53f5ba0c6067f9c4589e443fe2cdcdd0dddf41cb53
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 74C04CB1740605BADA108B509D45F0677546750701F188429B641A50E0CA74E410D62C
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00405B72
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ExecuteShell
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 587946157-0
                                                                                                                                                                                                  • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                                                                                                  • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                  • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                                                                                                                                                  • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FilePointer
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 973152223-0
                                                                                                                                                                                                  • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                  • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,00404292), ref: 004044C5
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CallbackDispatcherUser
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2492992576-0
                                                                                                                                                                                                  • Opcode ID: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                                                                                                                                                                                  • Instruction ID: 0db23a64e3c973129ccb7351ad80e5cfa0365495cc8a336c35755b545d17f2be
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 74A00275508601DBDE115B51DF09D057B71A7547017414579A18551034C6314461EB5D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                                                                                                                                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00403418,00403418,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000,00424420,762323A0), ref: 004055FA
                                                                                                                                                                                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\), ref: 0040560C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                                                                                                                                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                                                                                                                                                    • Part of subcall function 00405B20: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                                                                                                                                                                                    • Part of subcall function 00405B20: CloseHandle.KERNEL32(?), ref: 00405B56
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                    • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                                                                                                                                                    • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                                                                                                                                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2972824698-0
                                                                                                                                                                                                  • Opcode ID: 11aaa4362747121357e125e8dbb3e446f77891c3c0f7104508ea78bcc2682684
                                                                                                                                                                                                  • Instruction ID: a015d294fcb9cc4e365613bb9e09bf6e78b00889af70ee47f703a6c6056ea9c8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 11aaa4362747121357e125e8dbb3e446f77891c3c0f7104508ea78bcc2682684
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2DF09072904112EBCB21BBA59A84EDE76E8DF01318F25403BE102B21D1D77C4E429A6E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                                                                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(Remove folder: ,0042D268,00000000,?,?), ref: 00404AF1
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404AFD
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                                                                                                                                                                                                    • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                                                                                                                                                                                    • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                                                                                                                                                    • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                                                                                                                                                    • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                                                                                                                                                    • Part of subcall function 004067C4: CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                                                                                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                                                                                                                                                                                    • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                                                                                                                                                    • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                                                                                                                                                                                    • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                  • String ID: A$C:\Users\user\AppData\Local\Temp\nspF85F.tmp$Remove folder:
                                                                                                                                                                                                  • API String ID: 2624150263-3860924031
                                                                                                                                                                                                  • Opcode ID: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                                                                                                                                                  • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateInstance
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 542301482-0
                                                                                                                                                                                                  • Opcode ID: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                                                                                                                                                  • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFindFirst
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1974802433-0
                                                                                                                                                                                                  • Opcode ID: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                                                                                                                                                  • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                                                                                                                                                  • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                                                                                  • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404F29
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                                                                                                                                                                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                                                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                                                                                                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00405000
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                                                                                                                                                                                    • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 00405162
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00405340
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 004054EA
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                                                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004054FC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                  • String ID: $M$N
                                                                                                                                                                                                  • API String ID: 2564846305-813528018
                                                                                                                                                                                                  • Opcode ID: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                                                                                                                                                  • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                                                                                                                                                                                  • GetSysColor.USER32(?), ref: 00404738
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?), ref: 00404759
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                                                                                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                                                                                                                                                                                                  • SendMessageW.USER32(00000000), ref: 004047DB
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404806
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 0040485A
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 00404876
                                                                                                                                                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                                                                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                                                                  • String ID: N$Remove folder:
                                                                                                                                                                                                  • API String ID: 3103080414-3051863454
                                                                                                                                                                                                  • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                                                                                                                                                  • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                                                  • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                  • String ID: F
                                                                                                                                                                                                  • API String ID: 941294808-1304234792
                                                                                                                                                                                                  • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                                                                                                                                                  • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                                                                                                                                                                                  • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                                                                                                                                                                                                    • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                                                                                                                                                    • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                                                                                                                                                  • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                                                                                                                                                                                                  • wsprintfA.USER32 ref: 00406202
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                                                                                                                                                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 004062EB
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                                                                                                                                                                                    • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                                                                                                                                                    • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                                                                  • String ID: %ls=%ls$[Rename]
                                                                                                                                                                                                  • API String ID: 2171350718-461813615
                                                                                                                                                                                                  • Opcode ID: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                                                                                                                                                  • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                                                                                                                                                                                  • GetSysColor.USER32(00000000), ref: 0040455B
                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404567
                                                                                                                                                                                                  • SetBkMode.GDI32(?,?), ref: 00404573
                                                                                                                                                                                                  • GetSysColor.USER32(?), ref: 00404586
                                                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 00404596
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004045B0
                                                                                                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2320649405-0
                                                                                                                                                                                                  • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                  • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                                                                                                                                                  • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                                                                                                                                                  • CharNextW.USER32(?,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                                                                                                                                                  • CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                                                                                                  • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 589700163-826357637
                                                                                                                                                                                                  • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                                                                                                  • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                                                                                                                                                                                  • GetMessagePos.USER32 ref: 00404E77
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00404E91
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                  • String ID: f
                                                                                                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                                                                                                  • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                  • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDC.USER32(?), ref: 00401E51
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                                                                                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                                                                                                                                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,?,004055D6,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\,00000000), ref: 00406779
                                                                                                                                                                                                  • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                                                                                                                                  • String ID: MS Shell Dlg
                                                                                                                                                                                                  • API String ID: 2584051700-76309092
                                                                                                                                                                                                  • Opcode ID: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                                                                                                                                                  • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                                                                                                                                  • MulDiv.KERNEL32(0002BCF8,00000064,0002E668), ref: 00402FDC
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00402FEC
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • verifying installer: %d%%, xrefs: 00402FE6
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                  • String ID: verifying installer: %d%%
                                                                                                                                                                                                  • API String ID: 1451636040-82062127
                                                                                                                                                                                                  • Opcode ID: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                                                                                                                                                  • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2667972263-0
                                                                                                                                                                                                  • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                                                                                                                                                  • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                                                                                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseEnum$DeleteValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1354259210-0
                                                                                                                                                                                                  • Opcode ID: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                                                                                                                                                  • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00404DF0
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                  • String ID: %u.%u%s%s
                                                                                                                                                                                                  • API String ID: 3540041739-3551169577
                                                                                                                                                                                                  • Opcode ID: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                                                                                                                                                  • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharNextW.USER32(?,?,C:\,?,00405F2B,C:\,C:\, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                                                                                                                                                  • CharNextW.USER32(00000000), ref: 00405ECA
                                                                                                                                                                                                  • CharNextW.USER32(00000000), ref: 00405EE2
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharNext
                                                                                                                                                                                                  • String ID: C:\
                                                                                                                                                                                                  • API String ID: 3213498283-3404278061
                                                                                                                                                                                                  • Opcode ID: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                                                                                                                                                                                  • Instruction ID: b7f7aa27055ddc775a1b47344aef2f77b81fec2ea34db2f3ccdabfa21b6bce3d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7BF0F631810E1296DB317B548C44E7B97BCEB64354B04843BD741B71C0D3BC8D808BDA
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                                                                                                                                                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 2659869361-3936084776
                                                                                                                                                                                                  • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                  • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dll), ref: 00402695
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp$C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\inetc.dll
                                                                                                                                                                                                  • API String ID: 1659193697-3736122508
                                                                                                                                                                                                  • Opcode ID: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                                                                                                                                                  • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 0040304A
                                                                                                                                                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2102729457-0
                                                                                                                                                                                                  • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                                                                                                                                                  • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00405542
                                                                                                                                                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                                                                                                                                                                                    • Part of subcall function 004044E5: SendMessageW.USER32(00020442,00000000,00000000,00000000), ref: 004044F7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                                                                                                  • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                                                                                                                                                  • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,Remove folder: ,?,?,00406672,80000002), ref: 00406451
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,Remove folder: ,Remove folder: ,Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsnD97C.tmp\), ref: 0040645C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseQueryValue
                                                                                                                                                                                                  • String ID: Remove folder:
                                                                                                                                                                                                  • API String ID: 3356406503-1958208860
                                                                                                                                                                                                  • Opcode ID: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                                                                                                                                                  • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                                                                                                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                                                                                                                                                                                                  • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.2375143272.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375129203.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375158812.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375174983.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.2375311892.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 190613189-0
                                                                                                                                                                                                  • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                                                                                                  • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9

                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                  Execution Coverage:20.1%
                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                  Signature Coverage:0%
                                                                                                                                                                                                  Total number of Nodes:1386
                                                                                                                                                                                                  Total number of Limit Nodes:31
                                                                                                                                                                                                  execution_graph 3224 403640 SetErrorMode GetVersionExW 3225 403692 GetVersionExW 3224->3225 3226 4036ca 3224->3226 3225->3226 3227 403723 3226->3227 3228 406a35 5 API calls 3226->3228 3314 4069c5 GetSystemDirectoryW 3227->3314 3228->3227 3230 403739 lstrlenA 3230->3227 3231 403749 3230->3231 3317 406a35 GetModuleHandleA 3231->3317 3234 406a35 5 API calls 3235 403757 3234->3235 3236 406a35 5 API calls 3235->3236 3237 403763 #17 OleInitialize SHGetFileInfoW 3236->3237 3323 406668 lstrcpynW 3237->3323 3240 4037b0 GetCommandLineW 3324 406668 lstrcpynW 3240->3324 3242 4037c2 3325 405f64 3242->3325 3245 4038f7 3246 40390b GetTempPathW 3245->3246 3329 40360f 3246->3329 3248 403923 3250 403927 GetWindowsDirectoryW lstrcatW 3248->3250 3251 40397d DeleteFileW 3248->3251 3249 405f64 CharNextW 3253 4037f9 3249->3253 3254 40360f 12 API calls 3250->3254 3339 4030d0 GetTickCount GetModuleFileNameW 3251->3339 3253->3245 3253->3249 3258 4038f9 3253->3258 3256 403943 3254->3256 3255 403990 3259 403b6c ExitProcess CoUninitialize 3255->3259 3261 403a45 3255->3261 3268 405f64 CharNextW 3255->3268 3256->3251 3257 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3256->3257 3260 40360f 12 API calls 3257->3260 3426 406668 lstrcpynW 3258->3426 3263 403b91 3259->3263 3264 403b7c 3259->3264 3267 403975 3260->3267 3369 403d17 3261->3369 3265 403b99 GetCurrentProcess OpenProcessToken 3263->3265 3266 403c0f ExitProcess 3263->3266 3480 405cc8 3264->3480 3271 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 3265->3271 3272 403bdf 3265->3272 3267->3251 3267->3259 3283 4039b2 3268->3283 3271->3272 3276 406a35 5 API calls 3272->3276 3273 403a54 3273->3259 3279 403be6 3276->3279 3277 403a1b 3427 40603f 3277->3427 3278 403a5c 3443 405c33 3278->3443 3281 403bfb ExitWindowsEx 3279->3281 3285 403c08 3279->3285 3281->3266 3281->3285 3283->3277 3283->3278 3484 40140b 3285->3484 3288 403a72 lstrcatW 3289 403a7d lstrcatW lstrcmpiW 3288->3289 3289->3273 3290 403a9d 3289->3290 3292 403aa2 3290->3292 3293 403aa9 3290->3293 3446 405b99 CreateDirectoryW 3292->3446 3451 405c16 CreateDirectoryW 3293->3451 3294 403a3a 3442 406668 lstrcpynW 3294->3442 3299 403aae SetCurrentDirectoryW 3300 403ac0 3299->3300 3301 403acb 3299->3301 3454 406668 lstrcpynW 3300->3454 3455 406668 lstrcpynW 3301->3455 3306 403b19 CopyFileW 3310 403ad8 3306->3310 3307 403b63 3309 406428 36 API calls 3307->3309 3309->3273 3310->3307 3311 4066a5 17 API calls 3310->3311 3313 403b4d CloseHandle 3310->3313 3456 4066a5 3310->3456 3473 406428 MoveFileExW 3310->3473 3477 405c4b CreateProcessW 3310->3477 3311->3310 3313->3310 3315 4069e7 wsprintfW LoadLibraryExW 3314->3315 3315->3230 3318 406a51 3317->3318 3319 406a5b GetProcAddress 3317->3319 3320 4069c5 3 API calls 3318->3320 3321 403750 3319->3321 3322 406a57 3320->3322 3321->3234 3322->3319 3322->3321 3323->3240 3324->3242 3326 405f6a 3325->3326 3327 4037e8 CharNextW 3326->3327 3328 405f71 CharNextW 3326->3328 3327->3253 3328->3326 3487 4068ef 3329->3487 3331 403625 3331->3248 3332 40361b 3332->3331 3496 405f37 lstrlenW CharPrevW 3332->3496 3335 405c16 2 API calls 3336 403633 3335->3336 3499 406187 3336->3499 3503 406158 GetFileAttributesW CreateFileW 3339->3503 3341 403113 3368 403120 3341->3368 3504 406668 lstrcpynW 3341->3504 3343 403136 3505 405f83 lstrlenW 3343->3505 3347 403147 GetFileSize 3348 403241 3347->3348 3367 40315e 3347->3367 3510 40302e 3348->3510 3352 403286 GlobalAlloc 3355 40329d 3352->3355 3354 4032de 3356 40302e 32 API calls 3354->3356 3359 406187 2 API calls 3355->3359 3356->3368 3357 403267 3358 4035e2 ReadFile 3357->3358 3360 403272 3358->3360 3362 4032ae CreateFileW 3359->3362 3360->3352 3360->3368 3361 40302e 32 API calls 3361->3367 3363 4032e8 3362->3363 3362->3368 3525 4035f8 SetFilePointer 3363->3525 3365 4032f6 3526 403371 3365->3526 3367->3348 3367->3354 3367->3361 3367->3368 3541 4035e2 3367->3541 3368->3255 3370 406a35 5 API calls 3369->3370 3371 403d2b 3370->3371 3372 403d31 3371->3372 3373 403d43 3371->3373 3596 4065af wsprintfW 3372->3596 3597 406536 3373->3597 3377 403d92 lstrcatW 3378 403d41 3377->3378 3588 403fed 3378->3588 3379 406536 3 API calls 3379->3377 3382 40603f 18 API calls 3383 403dc4 3382->3383 3384 403e58 3383->3384 3386 406536 3 API calls 3383->3386 3385 40603f 18 API calls 3384->3385 3387 403e5e 3385->3387 3393 403df6 3386->3393 3388 403e6e LoadImageW 3387->3388 3389 4066a5 17 API calls 3387->3389 3390 403f14 3388->3390 3391 403e95 RegisterClassW 3388->3391 3389->3388 3395 40140b 2 API calls 3390->3395 3394 403ecb SystemParametersInfoW CreateWindowExW 3391->3394 3424 403f1e 3391->3424 3392 403e17 lstrlenW 3397 403e25 lstrcmpiW 3392->3397 3398 403e4b 3392->3398 3393->3384 3393->3392 3396 405f64 CharNextW 3393->3396 3394->3390 3399 403f1a 3395->3399 3400 403e14 3396->3400 3397->3398 3401 403e35 GetFileAttributesW 3397->3401 3402 405f37 3 API calls 3398->3402 3404 403fed 18 API calls 3399->3404 3399->3424 3400->3392 3403 403e41 3401->3403 3405 403e51 3402->3405 3403->3398 3406 405f83 2 API calls 3403->3406 3407 403f2b 3404->3407 3602 406668 lstrcpynW 3405->3602 3406->3398 3409 403f37 ShowWindow 3407->3409 3410 403fba 3407->3410 3411 4069c5 3 API calls 3409->3411 3603 40579d OleInitialize 3410->3603 3413 403f4f 3411->3413 3415 403f5d GetClassInfoW 3413->3415 3418 4069c5 3 API calls 3413->3418 3414 403fc0 3416 403fc4 3414->3416 3417 403fdc 3414->3417 3420 403f71 GetClassInfoW RegisterClassW 3415->3420 3421 403f87 DialogBoxParamW 3415->3421 3422 40140b 2 API calls 3416->3422 3416->3424 3419 40140b 2 API calls 3417->3419 3418->3415 3419->3424 3420->3421 3423 40140b 2 API calls 3421->3423 3422->3424 3425 403faf 3423->3425 3424->3273 3425->3424 3426->3246 3625 406668 lstrcpynW 3427->3625 3429 406050 3626 405fe2 CharNextW CharNextW 3429->3626 3432 403a27 3432->3259 3441 406668 lstrcpynW 3432->3441 3433 4068ef 5 API calls 3439 406066 3433->3439 3434 406097 lstrlenW 3435 4060a2 3434->3435 3434->3439 3436 405f37 3 API calls 3435->3436 3438 4060a7 GetFileAttributesW 3436->3438 3438->3432 3439->3432 3439->3434 3440 405f83 2 API calls 3439->3440 3632 40699e FindFirstFileW 3439->3632 3440->3434 3441->3294 3442->3261 3444 406a35 5 API calls 3443->3444 3445 403a61 lstrcatW 3444->3445 3445->3288 3445->3289 3447 403aa7 3446->3447 3448 405bea GetLastError 3446->3448 3447->3299 3448->3447 3449 405bf9 SetFileSecurityW 3448->3449 3449->3447 3450 405c0f GetLastError 3449->3450 3450->3447 3452 405c2a GetLastError 3451->3452 3453 405c26 3451->3453 3452->3453 3453->3299 3454->3301 3455->3310 3460 4066b2 3456->3460 3457 4068d5 3458 403b0d DeleteFileW 3457->3458 3637 406668 lstrcpynW 3457->3637 3458->3306 3458->3310 3460->3457 3461 4068a3 lstrlenW 3460->3461 3462 4067ba GetSystemDirectoryW 3460->3462 3465 406536 3 API calls 3460->3465 3466 4066a5 10 API calls 3460->3466 3467 4067cd GetWindowsDirectoryW 3460->3467 3468 406844 lstrcatW 3460->3468 3469 4066a5 10 API calls 3460->3469 3470 4068ef 5 API calls 3460->3470 3471 4067fc SHGetSpecialFolderLocation 3460->3471 3635 4065af wsprintfW 3460->3635 3636 406668 lstrcpynW 3460->3636 3461->3460 3462->3460 3465->3460 3466->3461 3467->3460 3468->3460 3469->3460 3470->3460 3471->3460 3472 406814 SHGetPathFromIDListW CoTaskMemFree 3471->3472 3472->3460 3474 406449 3473->3474 3475 40643c 3473->3475 3474->3310 3638 4062ae 3475->3638 3478 405c8a 3477->3478 3479 405c7e CloseHandle 3477->3479 3478->3310 3479->3478 3483 405cdd 3480->3483 3481 403b89 ExitProcess 3482 405cf1 MessageBoxIndirectW 3482->3481 3483->3481 3483->3482 3485 401389 2 API calls 3484->3485 3486 401420 3485->3486 3486->3266 3488 4068fc 3487->3488 3490 406972 3488->3490 3491 406965 CharNextW 3488->3491 3493 405f64 CharNextW 3488->3493 3494 406951 CharNextW 3488->3494 3495 406960 CharNextW 3488->3495 3489 406977 CharPrevW 3489->3490 3490->3489 3492 406998 3490->3492 3491->3488 3491->3490 3492->3332 3493->3488 3494->3488 3495->3491 3497 405f53 lstrcatW 3496->3497 3498 40362d 3496->3498 3497->3498 3498->3335 3500 406194 GetTickCount GetTempFileNameW 3499->3500 3501 40363e 3500->3501 3502 4061ca 3500->3502 3501->3248 3502->3500 3502->3501 3503->3341 3504->3343 3506 405f91 3505->3506 3507 40313c 3506->3507 3508 405f97 CharPrevW 3506->3508 3509 406668 lstrcpynW 3507->3509 3508->3506 3508->3507 3509->3347 3511 403057 3510->3511 3512 40303f 3510->3512 3514 403067 GetTickCount 3511->3514 3515 40305f 3511->3515 3513 403048 DestroyWindow 3512->3513 3518 40304f 3512->3518 3513->3518 3517 403075 3514->3517 3514->3518 3545 406a71 3515->3545 3519 4030aa CreateDialogParamW ShowWindow 3517->3519 3520 40307d 3517->3520 3518->3352 3518->3368 3544 4035f8 SetFilePointer 3518->3544 3519->3518 3520->3518 3549 403012 3520->3549 3522 40308b wsprintfW 3552 4056ca 3522->3552 3525->3365 3527 403380 SetFilePointer 3526->3527 3528 40339c 3526->3528 3527->3528 3563 403479 GetTickCount 3528->3563 3533 403479 42 API calls 3534 4033d3 3533->3534 3535 40343f ReadFile 3534->3535 3539 4033e2 3534->3539 3540 403439 3534->3540 3535->3540 3537 4061db ReadFile 3537->3539 3539->3537 3539->3540 3578 40620a WriteFile 3539->3578 3540->3368 3542 4061db ReadFile 3541->3542 3543 4035f5 3542->3543 3543->3367 3544->3357 3546 406a8e PeekMessageW 3545->3546 3547 406a84 DispatchMessageW 3546->3547 3548 406a9e 3546->3548 3547->3546 3548->3518 3550 403021 3549->3550 3551 403023 MulDiv 3549->3551 3550->3551 3551->3522 3553 4056e5 3552->3553 3554 4030a8 3552->3554 3555 405701 lstrlenW 3553->3555 3556 4066a5 17 API calls 3553->3556 3554->3518 3557 40572a 3555->3557 3558 40570f lstrlenW 3555->3558 3556->3555 3559 405730 SetWindowTextW 3557->3559 3560 40573d 3557->3560 3558->3554 3561 405721 lstrcatW 3558->3561 3559->3560 3560->3554 3562 405743 SendMessageW SendMessageW SendMessageW 3560->3562 3561->3557 3562->3554 3564 4035d1 3563->3564 3565 4034a7 3563->3565 3566 40302e 32 API calls 3564->3566 3580 4035f8 SetFilePointer 3565->3580 3573 4033a3 3566->3573 3568 4034b2 SetFilePointer 3572 4034d7 3568->3572 3569 4035e2 ReadFile 3569->3572 3571 40302e 32 API calls 3571->3572 3572->3569 3572->3571 3572->3573 3574 40620a WriteFile 3572->3574 3575 4035b2 SetFilePointer 3572->3575 3581 406bb0 3572->3581 3573->3540 3576 4061db ReadFile 3573->3576 3574->3572 3575->3564 3577 4033bc 3576->3577 3577->3533 3577->3540 3579 406228 3578->3579 3579->3539 3580->3568 3582 406bd5 3581->3582 3583 406bdd 3581->3583 3582->3572 3583->3582 3584 406c64 GlobalFree 3583->3584 3585 406c6d GlobalAlloc 3583->3585 3586 406ce4 GlobalAlloc 3583->3586 3587 406cdb GlobalFree 3583->3587 3584->3585 3585->3582 3585->3583 3586->3582 3586->3583 3587->3586 3589 404001 3588->3589 3610 4065af wsprintfW 3589->3610 3591 404072 3611 4040a6 3591->3611 3593 403da2 3593->3382 3594 404077 3594->3593 3595 4066a5 17 API calls 3594->3595 3595->3594 3596->3378 3614 4064d5 3597->3614 3600 403d73 3600->3377 3600->3379 3601 40656a RegQueryValueExW RegCloseKey 3601->3600 3602->3384 3618 404610 3603->3618 3605 4057e7 3606 404610 SendMessageW 3605->3606 3608 4057f9 OleUninitialize 3606->3608 3607 4057c0 3607->3605 3621 401389 3607->3621 3608->3414 3610->3591 3612 4066a5 17 API calls 3611->3612 3613 4040b4 SetWindowTextW 3612->3613 3613->3594 3615 4064e4 3614->3615 3616 4064e8 3615->3616 3617 4064ed RegOpenKeyExW 3615->3617 3616->3600 3616->3601 3617->3616 3619 404628 3618->3619 3620 404619 SendMessageW 3618->3620 3619->3607 3620->3619 3623 401390 3621->3623 3622 4013fe 3622->3607 3623->3622 3624 4013cb MulDiv SendMessageW 3623->3624 3624->3623 3625->3429 3627 405fff 3626->3627 3629 406011 3626->3629 3628 40600c CharNextW 3627->3628 3627->3629 3631 406035 3628->3631 3630 405f64 CharNextW 3629->3630 3629->3631 3630->3629 3631->3432 3631->3433 3633 4069b4 FindClose 3632->3633 3634 4069bf 3632->3634 3633->3634 3634->3439 3635->3460 3636->3460 3637->3458 3639 406304 GetShortPathNameW 3638->3639 3640 4062de 3638->3640 3641 406423 3639->3641 3642 406319 3639->3642 3665 406158 GetFileAttributesW CreateFileW 3640->3665 3641->3474 3642->3641 3644 406321 wsprintfA 3642->3644 3646 4066a5 17 API calls 3644->3646 3645 4062e8 CloseHandle GetShortPathNameW 3645->3641 3647 4062fc 3645->3647 3648 406349 3646->3648 3647->3639 3647->3641 3666 406158 GetFileAttributesW CreateFileW 3648->3666 3650 406356 3650->3641 3651 406365 GetFileSize GlobalAlloc 3650->3651 3652 406387 3651->3652 3653 40641c CloseHandle 3651->3653 3654 4061db ReadFile 3652->3654 3653->3641 3655 40638f 3654->3655 3655->3653 3667 4060bd lstrlenA 3655->3667 3658 4063a6 lstrcpyA 3661 4063c8 3658->3661 3659 4063ba 3660 4060bd 4 API calls 3659->3660 3660->3661 3662 4063ff SetFilePointer 3661->3662 3663 40620a WriteFile 3662->3663 3664 406415 GlobalFree 3663->3664 3664->3653 3665->3645 3666->3650 3668 4060fe lstrlenA 3667->3668 3669 406106 3668->3669 3670 4060d7 lstrcmpiA 3668->3670 3669->3658 3669->3659 3670->3669 3671 4060f5 CharNextA 3670->3671 3671->3668 3672 401941 3673 401943 3672->3673 3678 402da6 3673->3678 3679 402db2 3678->3679 3680 4066a5 17 API calls 3679->3680 3681 402dd3 3680->3681 3682 401948 3681->3682 3683 4068ef 5 API calls 3681->3683 3684 405d74 3682->3684 3683->3682 3685 40603f 18 API calls 3684->3685 3686 405d94 3685->3686 3687 405d9c DeleteFileW 3686->3687 3688 405db3 3686->3688 3692 401951 3687->3692 3689 405ed3 3688->3689 3720 406668 lstrcpynW 3688->3720 3689->3692 3696 40699e 2 API calls 3689->3696 3691 405dd9 3693 405dec 3691->3693 3694 405ddf lstrcatW 3691->3694 3695 405f83 2 API calls 3693->3695 3697 405df2 3694->3697 3695->3697 3699 405ef8 3696->3699 3698 405e02 lstrcatW 3697->3698 3700 405e0d lstrlenW FindFirstFileW 3697->3700 3698->3700 3699->3692 3701 405f37 3 API calls 3699->3701 3700->3689 3718 405e2f 3700->3718 3702 405f02 3701->3702 3704 405d2c 5 API calls 3702->3704 3703 405eb6 FindNextFileW 3707 405ecc FindClose 3703->3707 3703->3718 3706 405f0e 3704->3706 3708 405f12 3706->3708 3709 405f28 3706->3709 3707->3689 3708->3692 3712 4056ca 24 API calls 3708->3712 3711 4056ca 24 API calls 3709->3711 3711->3692 3714 405f1f 3712->3714 3713 405d74 60 API calls 3713->3718 3716 406428 36 API calls 3714->3716 3715 4056ca 24 API calls 3715->3703 3716->3692 3717 4056ca 24 API calls 3717->3718 3718->3703 3718->3713 3718->3715 3718->3717 3719 406428 36 API calls 3718->3719 3721 406668 lstrcpynW 3718->3721 3722 405d2c 3718->3722 3719->3718 3720->3691 3721->3718 3730 406133 GetFileAttributesW 3722->3730 3725 405d47 RemoveDirectoryW 3728 405d55 3725->3728 3726 405d4f DeleteFileW 3726->3728 3727 405d59 3727->3718 3728->3727 3729 405d65 SetFileAttributesW 3728->3729 3729->3727 3731 405d38 3730->3731 3732 406145 SetFileAttributesW 3730->3732 3731->3725 3731->3726 3731->3727 3732->3731 3733 4015c1 3734 402da6 17 API calls 3733->3734 3735 4015c8 3734->3735 3736 405fe2 4 API calls 3735->3736 3748 4015d1 3736->3748 3737 401631 3738 401663 3737->3738 3739 401636 3737->3739 3743 401423 24 API calls 3738->3743 3752 401423 3739->3752 3740 405f64 CharNextW 3740->3748 3749 40165b 3743->3749 3745 405c16 2 API calls 3745->3748 3746 405c33 5 API calls 3746->3748 3747 40164a SetCurrentDirectoryW 3747->3749 3748->3737 3748->3740 3748->3745 3748->3746 3750 401617 GetFileAttributesW 3748->3750 3751 405b99 4 API calls 3748->3751 3750->3748 3751->3748 3753 4056ca 24 API calls 3752->3753 3754 401431 3753->3754 3755 406668 lstrcpynW 3754->3755 3755->3747 3992 401c43 3993 402d84 17 API calls 3992->3993 3994 401c4a 3993->3994 3995 402d84 17 API calls 3994->3995 3996 401c57 3995->3996 3997 402da6 17 API calls 3996->3997 3998 401c6c 3996->3998 3997->3998 3999 401c7c 3998->3999 4000 402da6 17 API calls 3998->4000 4001 401cd3 3999->4001 4002 401c87 3999->4002 4000->3999 4004 402da6 17 API calls 4001->4004 4003 402d84 17 API calls 4002->4003 4006 401c8c 4003->4006 4005 401cd8 4004->4005 4007 402da6 17 API calls 4005->4007 4008 402d84 17 API calls 4006->4008 4009 401ce1 FindWindowExW 4007->4009 4010 401c98 4008->4010 4013 401d03 4009->4013 4011 401cc3 SendMessageW 4010->4011 4012 401ca5 SendMessageTimeoutW 4010->4012 4011->4013 4012->4013 4021 4028c4 4022 4028ca 4021->4022 4023 4028d2 FindClose 4022->4023 4024 402c2a 4022->4024 4023->4024 4025 4040c5 4026 4040dd 4025->4026 4027 40423e 4025->4027 4026->4027 4028 4040e9 4026->4028 4029 40424f GetDlgItem GetDlgItem 4027->4029 4034 40428f 4027->4034 4031 4040f4 SetWindowPos 4028->4031 4032 404107 4028->4032 4113 4045c4 4029->4113 4030 4042e9 4035 404610 SendMessageW 4030->4035 4043 404239 4030->4043 4031->4032 4036 404110 ShowWindow 4032->4036 4037 404152 4032->4037 4034->4030 4042 401389 2 API calls 4034->4042 4065 4042fb 4035->4065 4044 404130 GetWindowLongW 4036->4044 4045 4041fc 4036->4045 4039 404171 4037->4039 4040 40415a DestroyWindow 4037->4040 4038 404279 SetClassLongW 4041 40140b 2 API calls 4038->4041 4047 404176 SetWindowLongW 4039->4047 4048 404187 4039->4048 4046 40454d 4040->4046 4041->4034 4049 4042c1 4042->4049 4044->4045 4051 404149 ShowWindow 4044->4051 4099 40462b 4045->4099 4046->4043 4058 40457e ShowWindow 4046->4058 4047->4043 4048->4045 4052 404193 GetDlgItem 4048->4052 4049->4030 4053 4042c5 SendMessageW 4049->4053 4051->4037 4056 4041c1 4052->4056 4057 4041a4 SendMessageW IsWindowEnabled 4052->4057 4053->4043 4054 40140b 2 API calls 4054->4065 4055 40454f DestroyWindow EndDialog 4055->4046 4060 4041ce 4056->4060 4063 404215 SendMessageW 4056->4063 4064 4041e1 4056->4064 4070 4041c6 4056->4070 4057->4043 4057->4056 4058->4043 4059 4066a5 17 API calls 4059->4065 4060->4063 4060->4070 4062 4045c4 18 API calls 4062->4065 4063->4045 4066 4041e9 4064->4066 4067 4041fe 4064->4067 4065->4043 4065->4054 4065->4055 4065->4059 4065->4062 4071 4045c4 18 API calls 4065->4071 4087 40448f DestroyWindow 4065->4087 4069 40140b 2 API calls 4066->4069 4068 40140b 2 API calls 4067->4068 4068->4070 4069->4070 4070->4045 4096 40459d 4070->4096 4072 404376 GetDlgItem 4071->4072 4073 404393 ShowWindow EnableWindow 4072->4073 4074 40438b 4072->4074 4116 4045e6 EnableWindow 4073->4116 4074->4073 4076 4043bd EnableWindow 4081 4043d1 4076->4081 4077 4043d6 GetSystemMenu EnableMenuItem SendMessageW 4078 404406 SendMessageW 4077->4078 4077->4081 4078->4081 4080 4040a6 18 API calls 4080->4081 4081->4077 4081->4080 4117 4045f9 SendMessageW 4081->4117 4118 406668 lstrcpynW 4081->4118 4083 404435 lstrlenW 4084 4066a5 17 API calls 4083->4084 4085 40444b SetWindowTextW 4084->4085 4086 401389 2 API calls 4085->4086 4086->4065 4087->4046 4088 4044a9 CreateDialogParamW 4087->4088 4088->4046 4089 4044dc 4088->4089 4090 4045c4 18 API calls 4089->4090 4091 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4090->4091 4092 401389 2 API calls 4091->4092 4093 40452d 4092->4093 4093->4043 4094 404535 ShowWindow 4093->4094 4095 404610 SendMessageW 4094->4095 4095->4046 4097 4045a4 4096->4097 4098 4045aa SendMessageW 4096->4098 4097->4098 4098->4045 4100 4046ee 4099->4100 4101 404643 GetWindowLongW 4099->4101 4100->4043 4101->4100 4102 404658 4101->4102 4102->4100 4103 404685 GetSysColor 4102->4103 4104 404688 4102->4104 4103->4104 4105 404698 SetBkMode 4104->4105 4106 40468e SetTextColor 4104->4106 4107 4046b0 GetSysColor 4105->4107 4108 4046b6 4105->4108 4106->4105 4107->4108 4109 4046c7 4108->4109 4110 4046bd SetBkColor 4108->4110 4109->4100 4111 4046e1 CreateBrushIndirect 4109->4111 4112 4046da DeleteObject 4109->4112 4110->4109 4111->4100 4112->4111 4114 4066a5 17 API calls 4113->4114 4115 4045cf SetDlgItemTextW 4114->4115 4115->4038 4116->4076 4117->4081 4118->4083 4122 4016cc 4123 402da6 17 API calls 4122->4123 4124 4016d2 GetFullPathNameW 4123->4124 4125 4016ec 4124->4125 4131 40170e 4124->4131 4127 40699e 2 API calls 4125->4127 4125->4131 4126 401723 GetShortPathNameW 4128 402c2a 4126->4128 4129 4016fe 4127->4129 4129->4131 4132 406668 lstrcpynW 4129->4132 4131->4126 4131->4128 4132->4131 4133 401e4e GetDC 4134 402d84 17 API calls 4133->4134 4135 401e60 GetDeviceCaps MulDiv ReleaseDC 4134->4135 4136 402d84 17 API calls 4135->4136 4137 401e91 4136->4137 4138 4066a5 17 API calls 4137->4138 4139 401ece CreateFontIndirectW 4138->4139 4140 402638 4139->4140 4140->4140 3896 402950 3897 402da6 17 API calls 3896->3897 3899 40295c 3897->3899 3898 402972 3901 406133 2 API calls 3898->3901 3899->3898 3900 402da6 17 API calls 3899->3900 3900->3898 3902 402978 3901->3902 3924 406158 GetFileAttributesW CreateFileW 3902->3924 3904 402985 3905 402a3b 3904->3905 3906 4029a0 GlobalAlloc 3904->3906 3907 402a23 3904->3907 3908 402a42 DeleteFileW 3905->3908 3909 402a55 3905->3909 3906->3907 3910 4029b9 3906->3910 3911 403371 44 API calls 3907->3911 3908->3909 3925 4035f8 SetFilePointer 3910->3925 3913 402a30 CloseHandle 3911->3913 3913->3905 3914 4029bf 3915 4035e2 ReadFile 3914->3915 3916 4029c8 GlobalAlloc 3915->3916 3917 4029d8 3916->3917 3918 402a0c 3916->3918 3919 403371 44 API calls 3917->3919 3920 40620a WriteFile 3918->3920 3923 4029e5 3919->3923 3921 402a18 GlobalFree 3920->3921 3921->3907 3922 402a03 GlobalFree 3922->3918 3923->3922 3924->3904 3925->3914 4148 403cd5 4149 403ce0 4148->4149 4150 403ce4 4149->4150 4151 403ce7 GlobalAlloc 4149->4151 4151->4150 4152 401956 4153 402da6 17 API calls 4152->4153 4154 40195d lstrlenW 4153->4154 4155 402638 4154->4155 4156 4014d7 4157 402d84 17 API calls 4156->4157 4158 4014dd Sleep 4157->4158 4160 402c2a 4158->4160 3926 4020d8 3927 4020ea 3926->3927 3937 40219c 3926->3937 3928 402da6 17 API calls 3927->3928 3929 4020f1 3928->3929 3931 402da6 17 API calls 3929->3931 3930 401423 24 API calls 3933 4022f6 3930->3933 3932 4020fa 3931->3932 3934 402110 LoadLibraryExW 3932->3934 3935 402102 GetModuleHandleW 3932->3935 3936 402121 3934->3936 3934->3937 3935->3934 3935->3936 3946 406aa4 3936->3946 3937->3930 3940 402132 3943 401423 24 API calls 3940->3943 3944 402142 3940->3944 3941 40216b 3942 4056ca 24 API calls 3941->3942 3942->3944 3943->3944 3944->3933 3945 40218e FreeLibrary 3944->3945 3945->3933 3951 40668a WideCharToMultiByte 3946->3951 3948 406ac1 3949 406ac8 GetProcAddress 3948->3949 3950 40212c 3948->3950 3949->3950 3950->3940 3950->3941 3951->3948 4161 402b59 4162 402b60 4161->4162 4163 402bab 4161->4163 4165 402ba9 4162->4165 4167 402d84 17 API calls 4162->4167 4164 406a35 5 API calls 4163->4164 4166 402bb2 4164->4166 4168 402da6 17 API calls 4166->4168 4169 402b6e 4167->4169 4170 402bbb 4168->4170 4171 402d84 17 API calls 4169->4171 4170->4165 4172 402bbf IIDFromString 4170->4172 4174 402b7a 4171->4174 4172->4165 4173 402bce 4172->4173 4173->4165 4179 406668 lstrcpynW 4173->4179 4178 4065af wsprintfW 4174->4178 4177 402beb CoTaskMemFree 4177->4165 4178->4165 4179->4177 4180 402a5b 4181 402d84 17 API calls 4180->4181 4182 402a61 4181->4182 4183 402aa4 4182->4183 4184 402a88 4182->4184 4189 40292e 4182->4189 4186 402abe 4183->4186 4187 402aae 4183->4187 4185 402a8d 4184->4185 4193 402a9e 4184->4193 4194 406668 lstrcpynW 4185->4194 4188 4066a5 17 API calls 4186->4188 4190 402d84 17 API calls 4187->4190 4188->4193 4190->4193 4193->4189 4195 4065af wsprintfW 4193->4195 4194->4189 4195->4189 3975 40175c 3976 402da6 17 API calls 3975->3976 3977 401763 3976->3977 3978 406187 2 API calls 3977->3978 3979 40176a 3978->3979 3980 406187 2 API calls 3979->3980 3980->3979 4196 401d5d 4197 402d84 17 API calls 4196->4197 4198 401d6e SetWindowLongW 4197->4198 4199 402c2a 4198->4199 4200 4028de 4201 4028e6 4200->4201 4202 4028ea FindNextFileW 4201->4202 4204 4028fc 4201->4204 4203 402943 4202->4203 4202->4204 4206 406668 lstrcpynW 4203->4206 4206->4204 4207 406d5f 4213 406be3 4207->4213 4208 40754e 4209 406c64 GlobalFree 4210 406c6d GlobalAlloc 4209->4210 4210->4208 4210->4213 4211 406ce4 GlobalAlloc 4211->4208 4211->4213 4212 406cdb GlobalFree 4212->4211 4213->4208 4213->4209 4213->4210 4213->4211 4213->4212 4214 401563 4215 402ba4 4214->4215 4218 4065af wsprintfW 4215->4218 4217 402ba9 4218->4217 4219 401968 4220 402d84 17 API calls 4219->4220 4221 40196f 4220->4221 4222 402d84 17 API calls 4221->4222 4223 40197c 4222->4223 4224 402da6 17 API calls 4223->4224 4225 401993 lstrlenW 4224->4225 4227 4019a4 4225->4227 4226 4019e5 4227->4226 4231 406668 lstrcpynW 4227->4231 4229 4019d5 4229->4226 4230 4019da lstrlenW 4229->4230 4230->4226 4231->4229 4239 40166a 4240 402da6 17 API calls 4239->4240 4241 401670 4240->4241 4242 40699e 2 API calls 4241->4242 4243 401676 4242->4243 4244 402aeb 4245 402d84 17 API calls 4244->4245 4246 402af1 4245->4246 4247 4066a5 17 API calls 4246->4247 4248 40292e 4246->4248 4247->4248 4249 4026ec 4250 402d84 17 API calls 4249->4250 4251 4026fb 4250->4251 4252 402745 ReadFile 4251->4252 4253 4061db ReadFile 4251->4253 4255 402785 MultiByteToWideChar 4251->4255 4256 40283a 4251->4256 4258 4027ab SetFilePointer MultiByteToWideChar 4251->4258 4259 40284b 4251->4259 4261 402838 4251->4261 4262 406239 SetFilePointer 4251->4262 4252->4251 4252->4261 4253->4251 4255->4251 4271 4065af wsprintfW 4256->4271 4258->4251 4260 40286c SetFilePointer 4259->4260 4259->4261 4260->4261 4263 406255 4262->4263 4266 40626d 4262->4266 4264 4061db ReadFile 4263->4264 4265 406261 4264->4265 4265->4266 4267 406276 SetFilePointer 4265->4267 4268 40629e SetFilePointer 4265->4268 4266->4251 4267->4268 4269 406281 4267->4269 4268->4266 4270 40620a WriteFile 4269->4270 4270->4266 4271->4261 4272 404a6e 4273 404aa4 4272->4273 4274 404a7e 4272->4274 4276 40462b 8 API calls 4273->4276 4275 4045c4 18 API calls 4274->4275 4277 404a8b SetDlgItemTextW 4275->4277 4278 404ab0 4276->4278 4277->4273 3855 40176f 3856 402da6 17 API calls 3855->3856 3857 401776 3856->3857 3858 401796 3857->3858 3859 40179e 3857->3859 3894 406668 lstrcpynW 3858->3894 3895 406668 lstrcpynW 3859->3895 3862 40179c 3866 4068ef 5 API calls 3862->3866 3863 4017a9 3864 405f37 3 API calls 3863->3864 3865 4017af lstrcatW 3864->3865 3865->3862 3886 4017bb 3866->3886 3867 40699e 2 API calls 3867->3886 3868 406133 2 API calls 3868->3886 3870 4017cd CompareFileTime 3870->3886 3871 40188d 3873 4056ca 24 API calls 3871->3873 3872 401864 3874 4056ca 24 API calls 3872->3874 3882 401879 3872->3882 3875 401897 3873->3875 3874->3882 3876 403371 44 API calls 3875->3876 3877 4018aa 3876->3877 3878 4018be SetFileTime 3877->3878 3879 4018d0 CloseHandle 3877->3879 3878->3879 3881 4018e1 3879->3881 3879->3882 3880 4066a5 17 API calls 3880->3886 3884 4018e6 3881->3884 3885 4018f9 3881->3885 3883 406668 lstrcpynW 3883->3886 3887 4066a5 17 API calls 3884->3887 3888 4066a5 17 API calls 3885->3888 3886->3867 3886->3868 3886->3870 3886->3871 3886->3872 3886->3880 3886->3883 3889 405cc8 MessageBoxIndirectW 3886->3889 3893 406158 GetFileAttributesW CreateFileW 3886->3893 3890 4018ee lstrcatW 3887->3890 3891 401901 3888->3891 3889->3886 3890->3891 3892 405cc8 MessageBoxIndirectW 3891->3892 3892->3882 3893->3886 3894->3862 3895->3863 4279 401a72 4280 402d84 17 API calls 4279->4280 4281 401a7b 4280->4281 4282 402d84 17 API calls 4281->4282 4283 401a20 4282->4283 4284 401573 4285 401583 ShowWindow 4284->4285 4286 40158c 4284->4286 4285->4286 4287 402c2a 4286->4287 4288 40159a ShowWindow 4286->4288 4288->4287 4289 4023f4 4290 402da6 17 API calls 4289->4290 4291 402403 4290->4291 4292 402da6 17 API calls 4291->4292 4293 40240c 4292->4293 4294 402da6 17 API calls 4293->4294 4295 402416 GetPrivateProfileStringW 4294->4295 4296 4014f5 SetForegroundWindow 4297 402c2a 4296->4297 4298 401ff6 4299 402da6 17 API calls 4298->4299 4300 401ffd 4299->4300 4301 40699e 2 API calls 4300->4301 4302 402003 4301->4302 4304 402014 4302->4304 4305 4065af wsprintfW 4302->4305 4305->4304 4306 401b77 4307 402da6 17 API calls 4306->4307 4308 401b7e 4307->4308 4309 402d84 17 API calls 4308->4309 4310 401b87 wsprintfW 4309->4310 4311 402c2a 4310->4311 4312 4046fa lstrcpynW lstrlenW 4313 40167b 4314 402da6 17 API calls 4313->4314 4315 401682 4314->4315 4316 402da6 17 API calls 4315->4316 4317 40168b 4316->4317 4318 402da6 17 API calls 4317->4318 4319 401694 MoveFileW 4318->4319 4320 4016a0 4319->4320 4321 4016a7 4319->4321 4323 401423 24 API calls 4320->4323 4322 40699e 2 API calls 4321->4322 4325 4022f6 4321->4325 4324 4016b6 4322->4324 4323->4325 4324->4325 4326 406428 36 API calls 4324->4326 4326->4320 4334 4019ff 4335 402da6 17 API calls 4334->4335 4336 401a06 4335->4336 4337 402da6 17 API calls 4336->4337 4338 401a0f 4337->4338 4339 401a16 lstrcmpiW 4338->4339 4340 401a28 lstrcmpW 4338->4340 4341 401a1c 4339->4341 4340->4341 4342 4022ff 4343 402da6 17 API calls 4342->4343 4344 402305 4343->4344 4345 402da6 17 API calls 4344->4345 4346 40230e 4345->4346 4347 402da6 17 API calls 4346->4347 4348 402317 4347->4348 4349 40699e 2 API calls 4348->4349 4350 402320 4349->4350 4351 402331 lstrlenW lstrlenW 4350->4351 4352 402324 4350->4352 4354 4056ca 24 API calls 4351->4354 4353 4056ca 24 API calls 4352->4353 4356 40232c 4352->4356 4353->4356 4355 40236f SHFileOperationW 4354->4355 4355->4352 4355->4356 4357 401000 4358 401037 BeginPaint GetClientRect 4357->4358 4359 40100c DefWindowProcW 4357->4359 4361 4010f3 4358->4361 4362 401179 4359->4362 4363 401073 CreateBrushIndirect FillRect DeleteObject 4361->4363 4364 4010fc 4361->4364 4363->4361 4365 401102 CreateFontIndirectW 4364->4365 4366 401167 EndPaint 4364->4366 4365->4366 4367 401112 6 API calls 4365->4367 4366->4362 4367->4366 4368 401d81 4369 401d94 GetDlgItem 4368->4369 4370 401d87 4368->4370 4372 401d8e 4369->4372 4371 402d84 17 API calls 4370->4371 4371->4372 4373 401dd5 GetClientRect LoadImageW SendMessageW 4372->4373 4375 402da6 17 API calls 4372->4375 4376 401e33 4373->4376 4378 401e3f 4373->4378 4375->4373 4377 401e38 DeleteObject 4376->4377 4376->4378 4377->4378 4379 401503 4380 40150b 4379->4380 4382 40151e 4379->4382 4381 402d84 17 API calls 4380->4381 4381->4382 4383 404783 4384 40479b 4383->4384 4388 4048b5 4383->4388 4389 4045c4 18 API calls 4384->4389 4385 40491f 4386 4049e9 4385->4386 4387 404929 GetDlgItem 4385->4387 4394 40462b 8 API calls 4386->4394 4390 404943 4387->4390 4391 4049aa 4387->4391 4388->4385 4388->4386 4392 4048f0 GetDlgItem SendMessageW 4388->4392 4393 404802 4389->4393 4390->4391 4399 404969 SendMessageW LoadCursorW SetCursor 4390->4399 4391->4386 4395 4049bc 4391->4395 4416 4045e6 EnableWindow 4392->4416 4397 4045c4 18 API calls 4393->4397 4398 4049e4 4394->4398 4400 4049d2 4395->4400 4401 4049c2 SendMessageW 4395->4401 4403 40480f CheckDlgButton 4397->4403 4420 404a32 4399->4420 4400->4398 4406 4049d8 SendMessageW 4400->4406 4401->4400 4402 40491a 4417 404a0e 4402->4417 4414 4045e6 EnableWindow 4403->4414 4406->4398 4409 40482d GetDlgItem 4415 4045f9 SendMessageW 4409->4415 4411 404843 SendMessageW 4412 404860 GetSysColor 4411->4412 4413 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4411->4413 4412->4413 4413->4398 4414->4409 4415->4411 4416->4402 4418 404a21 SendMessageW 4417->4418 4419 404a1c 4417->4419 4418->4385 4419->4418 4423 405c8e ShellExecuteExW 4420->4423 4422 404998 LoadCursorW SetCursor 4422->4391 4423->4422 4424 402383 4425 40238a 4424->4425 4428 40239d 4424->4428 4426 4066a5 17 API calls 4425->4426 4427 402397 4426->4427 4429 405cc8 MessageBoxIndirectW 4427->4429 4429->4428 4430 402c05 SendMessageW 4431 402c2a 4430->4431 4432 402c1f InvalidateRect 4430->4432 4432->4431 3790 401389 3792 401390 3790->3792 3791 4013fe 3792->3791 3793 4013cb MulDiv SendMessageW 3792->3793 3793->3792 4433 405809 4434 4059b3 4433->4434 4435 40582a GetDlgItem GetDlgItem GetDlgItem 4433->4435 4437 4059e4 4434->4437 4438 4059bc GetDlgItem CreateThread CloseHandle 4434->4438 4478 4045f9 SendMessageW 4435->4478 4440 405a0f 4437->4440 4441 405a34 4437->4441 4442 4059fb ShowWindow ShowWindow 4437->4442 4438->4437 4439 40589a 4444 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4439->4444 4443 405a6f 4440->4443 4446 405a23 4440->4446 4447 405a49 ShowWindow 4440->4447 4448 40462b 8 API calls 4441->4448 4480 4045f9 SendMessageW 4442->4480 4443->4441 4453 405a7d SendMessageW 4443->4453 4451 4058f3 SendMessageW SendMessageW 4444->4451 4452 40590f 4444->4452 4454 40459d SendMessageW 4446->4454 4449 405a69 4447->4449 4450 405a5b 4447->4450 4459 405a42 4448->4459 4456 40459d SendMessageW 4449->4456 4455 4056ca 24 API calls 4450->4455 4451->4452 4457 405922 4452->4457 4458 405914 SendMessageW 4452->4458 4453->4459 4460 405a96 CreatePopupMenu 4453->4460 4454->4441 4455->4449 4456->4443 4462 4045c4 18 API calls 4457->4462 4458->4457 4461 4066a5 17 API calls 4460->4461 4463 405aa6 AppendMenuW 4461->4463 4464 405932 4462->4464 4465 405ac3 GetWindowRect 4463->4465 4466 405ad6 TrackPopupMenu 4463->4466 4467 40593b ShowWindow 4464->4467 4468 40596f GetDlgItem SendMessageW 4464->4468 4465->4466 4466->4459 4470 405af1 4466->4470 4471 405951 ShowWindow 4467->4471 4472 40595e 4467->4472 4468->4459 4469 405996 SendMessageW SendMessageW 4468->4469 4469->4459 4473 405b0d SendMessageW 4470->4473 4471->4472 4479 4045f9 SendMessageW 4472->4479 4473->4473 4474 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4473->4474 4476 405b4f SendMessageW 4474->4476 4476->4476 4477 405b78 GlobalUnlock SetClipboardData CloseClipboard 4476->4477 4477->4459 4478->4439 4479->4468 4480->4440 3794 40248a 3795 402da6 17 API calls 3794->3795 3796 40249c 3795->3796 3797 402da6 17 API calls 3796->3797 3798 4024a6 3797->3798 3811 402e36 3798->3811 3801 40292e 3802 4024de 3804 4024ea 3802->3804 3815 402d84 3802->3815 3803 402da6 17 API calls 3805 4024d4 lstrlenW 3803->3805 3807 402509 RegSetValueExW 3804->3807 3808 403371 44 API calls 3804->3808 3805->3802 3809 40251f RegCloseKey 3807->3809 3808->3807 3809->3801 3812 402e51 3811->3812 3818 406503 3812->3818 3816 4066a5 17 API calls 3815->3816 3817 402d99 3816->3817 3817->3804 3819 406512 3818->3819 3820 4024b6 3819->3820 3821 40651d RegCreateKeyExW 3819->3821 3820->3801 3820->3802 3820->3803 3821->3820 4481 404e0b 4482 404e37 4481->4482 4483 404e1b 4481->4483 4485 404e6a 4482->4485 4486 404e3d SHGetPathFromIDListW 4482->4486 4492 405cac GetDlgItemTextW 4483->4492 4487 404e54 SendMessageW 4486->4487 4488 404e4d 4486->4488 4487->4485 4490 40140b 2 API calls 4488->4490 4489 404e28 SendMessageW 4489->4482 4490->4487 4492->4489 4493 40290b 4494 402da6 17 API calls 4493->4494 4495 402912 FindFirstFileW 4494->4495 4496 40293a 4495->4496 4500 402925 4495->4500 4501 4065af wsprintfW 4496->4501 4498 402943 4502 406668 lstrcpynW 4498->4502 4501->4498 4502->4500 4503 40190c 4504 401943 4503->4504 4505 402da6 17 API calls 4504->4505 4506 401948 4505->4506 4507 405d74 67 API calls 4506->4507 4508 401951 4507->4508 4509 40190f 4510 402da6 17 API calls 4509->4510 4511 401916 4510->4511 4512 405cc8 MessageBoxIndirectW 4511->4512 4513 40191f 4512->4513 4514 401491 4515 4056ca 24 API calls 4514->4515 4516 401498 4515->4516 4517 402891 4518 402898 4517->4518 4519 402ba9 4517->4519 4520 402d84 17 API calls 4518->4520 4521 40289f 4520->4521 4522 4028ae SetFilePointer 4521->4522 4522->4519 4523 4028be 4522->4523 4525 4065af wsprintfW 4523->4525 4525->4519 4526 401f12 4527 402da6 17 API calls 4526->4527 4528 401f18 4527->4528 4529 402da6 17 API calls 4528->4529 4530 401f21 4529->4530 4531 402da6 17 API calls 4530->4531 4532 401f2a 4531->4532 4533 402da6 17 API calls 4532->4533 4534 401f33 4533->4534 4535 401423 24 API calls 4534->4535 4536 401f3a 4535->4536 4543 405c8e ShellExecuteExW 4536->4543 4538 401f82 4539 406ae0 5 API calls 4538->4539 4541 40292e 4538->4541 4540 401f9f CloseHandle 4539->4540 4540->4541 4543->4538 4544 402f93 4545 402fa5 SetTimer 4544->4545 4546 402fbe 4544->4546 4545->4546 4547 40300c 4546->4547 4548 403012 MulDiv 4546->4548 4549 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4548->4549 4549->4547 4565 401d17 4566 402d84 17 API calls 4565->4566 4567 401d1d IsWindow 4566->4567 4568 401a20 4567->4568 3952 401b9b 3953 401ba8 3952->3953 3954 401bec 3952->3954 3961 401bbf 3953->3961 3963 401c31 3953->3963 3955 401bf1 3954->3955 3956 401c16 GlobalAlloc 3954->3956 3960 40239d 3955->3960 3971 406668 lstrcpynW 3955->3971 3958 4066a5 17 API calls 3956->3958 3957 4066a5 17 API calls 3959 402397 3957->3959 3958->3963 3967 405cc8 MessageBoxIndirectW 3959->3967 3972 406668 lstrcpynW 3961->3972 3963->3957 3963->3960 3965 401c03 GlobalFree 3965->3960 3966 401bce 3973 406668 lstrcpynW 3966->3973 3967->3960 3969 401bdd 3974 406668 lstrcpynW 3969->3974 3971->3965 3972->3966 3973->3969 3974->3960 4569 40261c 4570 402da6 17 API calls 4569->4570 4571 402623 4570->4571 4574 406158 GetFileAttributesW CreateFileW 4571->4574 4573 40262f 4574->4573 3981 40259e 3982 402de6 17 API calls 3981->3982 3983 4025a8 3982->3983 3984 402d84 17 API calls 3983->3984 3985 4025b1 3984->3985 3986 40292e 3985->3986 3987 4025d9 RegEnumValueW 3985->3987 3988 4025cd RegEnumKeyW 3985->3988 3989 4025ee 3987->3989 3990 4025f5 RegCloseKey 3987->3990 3988->3990 3989->3990 3990->3986 4582 40149e 4583 4014ac PostQuitMessage 4582->4583 4584 40239d 4582->4584 4583->4584 4585 4015a3 4586 402da6 17 API calls 4585->4586 4587 4015aa SetFileAttributesW 4586->4587 4588 4015bc 4587->4588 3756 401fa4 3757 402da6 17 API calls 3756->3757 3758 401faa 3757->3758 3759 4056ca 24 API calls 3758->3759 3760 401fb4 3759->3760 3761 405c4b 2 API calls 3760->3761 3762 401fba 3761->3762 3763 401fdd CloseHandle 3762->3763 3767 40292e 3762->3767 3771 406ae0 WaitForSingleObject 3762->3771 3763->3767 3766 401fcf 3768 401fd4 3766->3768 3769 401fdf 3766->3769 3776 4065af wsprintfW 3768->3776 3769->3763 3772 406afa 3771->3772 3773 406b0c GetExitCodeProcess 3772->3773 3774 406a71 2 API calls 3772->3774 3773->3766 3775 406b01 WaitForSingleObject 3774->3775 3775->3772 3776->3763 3777 403c25 3778 403c40 3777->3778 3779 403c36 CloseHandle 3777->3779 3780 403c54 3778->3780 3781 403c4a CloseHandle 3778->3781 3779->3778 3786 403c82 3780->3786 3781->3780 3784 405d74 67 API calls 3785 403c65 3784->3785 3787 403c90 3786->3787 3788 403c59 3787->3788 3789 403c95 FreeLibrary GlobalFree 3787->3789 3788->3784 3789->3788 3789->3789 3822 40252a 3833 402de6 3822->3833 3825 402da6 17 API calls 3826 40253d 3825->3826 3827 402548 RegQueryValueExW 3826->3827 3831 40292e 3826->3831 3828 40256e RegCloseKey 3827->3828 3829 402568 3827->3829 3828->3831 3829->3828 3838 4065af wsprintfW 3829->3838 3834 402da6 17 API calls 3833->3834 3835 402dfd 3834->3835 3836 4064d5 RegOpenKeyExW 3835->3836 3837 402534 3836->3837 3837->3825 3838->3828 3839 4021aa 3840 402da6 17 API calls 3839->3840 3841 4021b1 3840->3841 3842 402da6 17 API calls 3841->3842 3843 4021bb 3842->3843 3844 402da6 17 API calls 3843->3844 3845 4021c5 3844->3845 3846 402da6 17 API calls 3845->3846 3847 4021cf 3846->3847 3848 402da6 17 API calls 3847->3848 3849 4021d9 3848->3849 3850 402218 CoCreateInstance 3849->3850 3851 402da6 17 API calls 3849->3851 3854 402237 3850->3854 3851->3850 3852 401423 24 API calls 3853 4022f6 3852->3853 3854->3852 3854->3853 4589 40202a 4590 402da6 17 API calls 4589->4590 4591 402031 4590->4591 4592 406a35 5 API calls 4591->4592 4593 402040 4592->4593 4594 4020cc 4593->4594 4595 40205c GlobalAlloc 4593->4595 4595->4594 4596 402070 4595->4596 4597 406a35 5 API calls 4596->4597 4598 402077 4597->4598 4599 406a35 5 API calls 4598->4599 4600 402081 4599->4600 4600->4594 4604 4065af wsprintfW 4600->4604 4602 4020ba 4605 4065af wsprintfW 4602->4605 4604->4602 4605->4594 4613 401a30 4614 402da6 17 API calls 4613->4614 4615 401a39 ExpandEnvironmentStringsW 4614->4615 4616 401a60 4615->4616 4617 401a4d 4615->4617 4617->4616 4618 401a52 lstrcmpW 4617->4618 4618->4616 4619 405031 GetDlgItem GetDlgItem 4620 405083 7 API calls 4619->4620 4621 4052a8 4619->4621 4622 40512a DeleteObject 4620->4622 4623 40511d SendMessageW 4620->4623 4626 40538a 4621->4626 4653 405317 4621->4653 4673 404f7f SendMessageW 4621->4673 4624 405133 4622->4624 4623->4622 4625 40516a 4624->4625 4629 4066a5 17 API calls 4624->4629 4627 4045c4 18 API calls 4625->4627 4628 405436 4626->4628 4632 40529b 4626->4632 4638 4053e3 SendMessageW 4626->4638 4631 40517e 4627->4631 4633 405440 SendMessageW 4628->4633 4634 405448 4628->4634 4630 40514c SendMessageW SendMessageW 4629->4630 4630->4624 4637 4045c4 18 API calls 4631->4637 4635 40462b 8 API calls 4632->4635 4633->4634 4641 405461 4634->4641 4642 40545a ImageList_Destroy 4634->4642 4649 405471 4634->4649 4640 405637 4635->4640 4654 40518f 4637->4654 4638->4632 4644 4053f8 SendMessageW 4638->4644 4639 40537c SendMessageW 4639->4626 4645 40546a GlobalFree 4641->4645 4641->4649 4642->4641 4643 4055eb 4643->4632 4650 4055fd ShowWindow GetDlgItem ShowWindow 4643->4650 4647 40540b 4644->4647 4645->4649 4646 40526a GetWindowLongW SetWindowLongW 4648 405283 4646->4648 4658 40541c SendMessageW 4647->4658 4651 4052a0 4648->4651 4652 405288 ShowWindow 4648->4652 4649->4643 4666 4054ac 4649->4666 4678 404fff 4649->4678 4650->4632 4672 4045f9 SendMessageW 4651->4672 4671 4045f9 SendMessageW 4652->4671 4653->4626 4653->4639 4654->4646 4657 4051e2 SendMessageW 4654->4657 4659 405265 4654->4659 4660 405220 SendMessageW 4654->4660 4661 405234 SendMessageW 4654->4661 4657->4654 4658->4628 4659->4646 4659->4648 4660->4654 4661->4654 4663 4055b6 4664 4055c1 InvalidateRect 4663->4664 4667 4055cd 4663->4667 4664->4667 4665 4054da SendMessageW 4669 4054f0 4665->4669 4666->4665 4666->4669 4667->4643 4687 404f3a 4667->4687 4668 405564 SendMessageW SendMessageW 4668->4669 4669->4663 4669->4668 4671->4632 4672->4621 4674 404fa2 GetMessagePos ScreenToClient SendMessageW 4673->4674 4675 404fde SendMessageW 4673->4675 4676 404fd6 4674->4676 4677 404fdb 4674->4677 4675->4676 4676->4653 4677->4675 4690 406668 lstrcpynW 4678->4690 4680 405012 4691 4065af wsprintfW 4680->4691 4682 40501c 4683 40140b 2 API calls 4682->4683 4684 405025 4683->4684 4692 406668 lstrcpynW 4684->4692 4686 40502c 4686->4666 4693 404e71 4687->4693 4689 404f4f 4689->4643 4690->4680 4691->4682 4692->4686 4694 404e8a 4693->4694 4695 4066a5 17 API calls 4694->4695 4696 404eee 4695->4696 4697 4066a5 17 API calls 4696->4697 4698 404ef9 4697->4698 4699 4066a5 17 API calls 4698->4699 4700 404f0f lstrlenW wsprintfW SetDlgItemTextW 4699->4700 4700->4689 4706 4023b2 4707 4023ba 4706->4707 4710 4023c0 4706->4710 4708 402da6 17 API calls 4707->4708 4708->4710 4709 4023ce 4712 4023dc 4709->4712 4713 402da6 17 API calls 4709->4713 4710->4709 4711 402da6 17 API calls 4710->4711 4711->4709 4714 402da6 17 API calls 4712->4714 4713->4712 4715 4023e5 WritePrivateProfileStringW 4714->4715 4716 404734 lstrlenW 4717 404753 4716->4717 4718 404755 WideCharToMultiByte 4716->4718 4717->4718 4719 402434 4720 402467 4719->4720 4721 40243c 4719->4721 4723 402da6 17 API calls 4720->4723 4722 402de6 17 API calls 4721->4722 4724 402443 4722->4724 4725 40246e 4723->4725 4727 402da6 17 API calls 4724->4727 4729 40247b 4724->4729 4730 402e64 4725->4730 4728 402454 RegDeleteValueW RegCloseKey 4727->4728 4728->4729 4731 402e78 4730->4731 4733 402e71 4730->4733 4731->4733 4734 402ea9 4731->4734 4733->4729 4735 4064d5 RegOpenKeyExW 4734->4735 4736 402ed7 4735->4736 4737 402ee7 RegEnumValueW 4736->4737 4744 402f81 4736->4744 4746 402f0a 4736->4746 4738 402f71 RegCloseKey 4737->4738 4737->4746 4738->4744 4739 402f46 RegEnumKeyW 4740 402f4f RegCloseKey 4739->4740 4739->4746 4741 406a35 5 API calls 4740->4741 4742 402f5f 4741->4742 4742->4744 4745 402f63 RegDeleteKeyW 4742->4745 4743 402ea9 6 API calls 4743->4746 4744->4733 4745->4744 4746->4738 4746->4739 4746->4740 4746->4743 4747 401735 4748 402da6 17 API calls 4747->4748 4749 40173c SearchPathW 4748->4749 4750 401757 4749->4750 4751 404ab5 4752 404ae1 4751->4752 4753 404af2 4751->4753 4812 405cac GetDlgItemTextW 4752->4812 4755 404afe GetDlgItem 4753->4755 4760 404b5d 4753->4760 4758 404b12 4755->4758 4756 404c41 4761 404df0 4756->4761 4814 405cac GetDlgItemTextW 4756->4814 4757 404aec 4759 4068ef 5 API calls 4757->4759 4763 404b26 SetWindowTextW 4758->4763 4764 405fe2 4 API calls 4758->4764 4759->4753 4760->4756 4760->4761 4765 4066a5 17 API calls 4760->4765 4768 40462b 8 API calls 4761->4768 4767 4045c4 18 API calls 4763->4767 4769 404b1c 4764->4769 4770 404bd1 SHBrowseForFolderW 4765->4770 4766 404c71 4771 40603f 18 API calls 4766->4771 4772 404b42 4767->4772 4773 404e04 4768->4773 4769->4763 4777 405f37 3 API calls 4769->4777 4770->4756 4774 404be9 CoTaskMemFree 4770->4774 4775 404c77 4771->4775 4776 4045c4 18 API calls 4772->4776 4778 405f37 3 API calls 4774->4778 4815 406668 lstrcpynW 4775->4815 4779 404b50 4776->4779 4777->4763 4780 404bf6 4778->4780 4813 4045f9 SendMessageW 4779->4813 4783 404c2d SetDlgItemTextW 4780->4783 4788 4066a5 17 API calls 4780->4788 4783->4756 4784 404b56 4786 406a35 5 API calls 4784->4786 4785 404c8e 4787 406a35 5 API calls 4785->4787 4786->4760 4794 404c95 4787->4794 4789 404c15 lstrcmpiW 4788->4789 4789->4783 4792 404c26 lstrcatW 4789->4792 4790 404cd6 4816 406668 lstrcpynW 4790->4816 4792->4783 4793 404cdd 4795 405fe2 4 API calls 4793->4795 4794->4790 4798 405f83 2 API calls 4794->4798 4800 404d2e 4794->4800 4796 404ce3 GetDiskFreeSpaceW 4795->4796 4799 404d07 MulDiv 4796->4799 4796->4800 4798->4794 4799->4800 4802 404f3a 20 API calls 4800->4802 4810 404d9f 4800->4810 4801 404dc2 4817 4045e6 EnableWindow 4801->4817 4804 404d8c 4802->4804 4803 40140b 2 API calls 4803->4801 4806 404da1 SetDlgItemTextW 4804->4806 4807 404d91 4804->4807 4806->4810 4808 404e71 20 API calls 4807->4808 4808->4810 4809 404dde 4809->4761 4811 404a0e SendMessageW 4809->4811 4810->4801 4810->4803 4811->4761 4812->4757 4813->4784 4814->4766 4815->4785 4816->4793 4817->4809 4818 401d38 4819 402d84 17 API calls 4818->4819 4820 401d3f 4819->4820 4821 402d84 17 API calls 4820->4821 4822 401d4b GetDlgItem 4821->4822 4823 402638 4822->4823 4824 4014b8 4825 4014be 4824->4825 4826 401389 2 API calls 4825->4826 4827 4014c6 4826->4827 4828 40563e 4829 405662 4828->4829 4830 40564e 4828->4830 4833 40566a IsWindowVisible 4829->4833 4839 405681 4829->4839 4831 405654 4830->4831 4832 4056ab 4830->4832 4835 404610 SendMessageW 4831->4835 4834 4056b0 CallWindowProcW 4832->4834 4833->4832 4836 405677 4833->4836 4837 40565e 4834->4837 4835->4837 4838 404f7f 5 API calls 4836->4838 4838->4839 4839->4834 4840 404fff 4 API calls 4839->4840 4840->4832 4841 40263e 4842 402652 4841->4842 4843 40266d 4841->4843 4844 402d84 17 API calls 4842->4844 4845 402672 4843->4845 4846 40269d 4843->4846 4855 402659 4844->4855 4848 402da6 17 API calls 4845->4848 4847 402da6 17 API calls 4846->4847 4850 4026a4 lstrlenW 4847->4850 4849 402679 4848->4849 4858 40668a WideCharToMultiByte 4849->4858 4850->4855 4852 40268d lstrlenA 4852->4855 4853 4026e7 4854 4026d1 4854->4853 4856 40620a WriteFile 4854->4856 4855->4853 4855->4854 4857 406239 5 API calls 4855->4857 4856->4853 4857->4854 4858->4852

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a ExitProcess CoUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 72 403b91-403b97 65->72 73 403b7c-403b8b call 405cc8 ExitProcess 65->73 66->53 67->53 67->66 88 403a0c-403a19 69->88 89 4039bc-4039f1 69->89 83 403a54-403a57 70->83 74 403b99-403bae GetCurrentProcess OpenProcessToken 72->74 75 403c0f-403c17 72->75 80 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 74->80 81 403bdf-403bed call 406a35 74->81 84 403c19 75->84 85 403c1c-403c1f ExitProcess 75->85 80->81 95 403bfb-403c06 ExitWindowsEx 81->95 96 403bef-403bf9 81->96 83->65 84->85 90 403a1b-403a29 call 40603f 88->90 91 403a5c-403a70 call 405c33 lstrcatW 88->91 93 4039f3-4039f7 89->93 90->65 104 403a2f-403a45 call 406668 * 2 90->104 107 403a72-403a78 lstrcatW 91->107 108 403a7d-403a97 lstrcatW lstrcmpiW 91->108 98 403a00-403a08 93->98 99 4039f9-4039fe 93->99 95->75 101 403c08-403c0a call 40140b 95->101 96->95 96->101 98->93 103 403a0a 98->103 99->98 99->103 101->75 103->88 104->70 107->108 109 403b6a 108->109 110 403a9d-403aa0 108->110 109->65 112 403aa2-403aa7 call 405b99 110->112 113 403aa9 call 405c16 110->113 119 403aae-403abe SetCurrentDirectoryW 112->119 113->119 121 403ac0-403ac6 call 406668 119->121 122 403acb-403af7 call 406668 119->122 121->122 126 403afc-403b17 call 4066a5 DeleteFileW 122->126 129 403b57-403b61 126->129 130 403b19-403b29 CopyFileW 126->130 129->126 132 403b63-403b65 call 406428 129->132 130->129 131 403b2b-403b4b call 406428 call 4066a5 call 405c4b 130->131 131->129 140 403b4d-403b54 CloseHandle 131->140 132->109 140->129
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00008001), ref: 00403663
                                                                                                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 0040368C
                                                                                                                                                                                                  • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                                                                                                                                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                                                                                                                                                                                  • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                                                                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 0040377D
                                                                                                                                                                                                  • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                                                                                                                                                                                  • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                                                                                                                                                                                  • CharNextW.USER32(00000000,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000020,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000000), ref: 004037E9
                                                                                                                                                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040391C
                                                                                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040392D
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403939
                                                                                                                                                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040394D
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403955
                                                                                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403966
                                                                                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040396E
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(1033), ref: 00403982
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000000,?), ref: 00403A69
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000000,?), ref: 00403A78
                                                                                                                                                                                                    • Part of subcall function 00405C16: CreateDirectoryW.KERNEL32(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000000,?), ref: 00403A83
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force,00000000,?), ref: 00403A8F
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AAF
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(00420F08,00420F08,?,5035937,?), ref: 00403B0E
                                                                                                                                                                                                  • CopyFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nspF85F.tmp,00420F08,00000001), ref: 00403B21
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                                                                                                                                                                                  • ExitProcess.KERNEL32(?), ref: 00403B6C
                                                                                                                                                                                                  • CoUninitialize.COMBASE(?), ref: 00403B71
                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403B8B
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                                                                                                                                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403C1F
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                                                                                                                                  • String ID: "C:\Users\user\AppData\Local\Temp\nspF85F.tmp" /internal 1728941759157143 /force$.tmp$1033$5035937$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nspF85F.tmp$C:\Users\user\PCAppStore$C:\Users\user\PCAppStore$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                                                                                                                  • API String ID: 2292928366-1289249542
                                                                                                                                                                                                  • Opcode ID: 54eba713b65b488fe05b557adb658f0301d1077f312d6d7219dab3d109336353
                                                                                                                                                                                                  • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 54eba713b65b488fe05b557adb658f0301d1077f312d6d7219dab3d109336353
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 346 405d74-405d9a call 40603f 349 405db3-405dba 346->349 350 405d9c-405dae DeleteFileW 346->350 352 405dbc-405dbe 349->352 353 405dcd-405ddd call 406668 349->353 351 405f30-405f34 350->351 354 405dc4-405dc7 352->354 355 405ede-405ee3 352->355 361 405dec-405ded call 405f83 353->361 362 405ddf-405dea lstrcatW 353->362 354->353 354->355 355->351 357 405ee5-405ee8 355->357 359 405ef2-405efa call 40699e 357->359 360 405eea-405ef0 357->360 359->351 370 405efc-405f10 call 405f37 call 405d2c 359->370 360->351 365 405df2-405df6 361->365 362->365 366 405e02-405e08 lstrcatW 365->366 367 405df8-405e00 365->367 369 405e0d-405e29 lstrlenW FindFirstFileW 366->369 367->366 367->369 371 405ed3-405ed7 369->371 372 405e2f-405e37 369->372 386 405f12-405f15 370->386 387 405f28-405f2b call 4056ca 370->387 371->355 377 405ed9 371->377 374 405e57-405e6b call 406668 372->374 375 405e39-405e41 372->375 388 405e82-405e8d call 405d2c 374->388 389 405e6d-405e75 374->389 378 405e43-405e4b 375->378 379 405eb6-405ec6 FindNextFileW 375->379 377->355 378->374 382 405e4d-405e55 378->382 379->372 385 405ecc-405ecd FindClose 379->385 382->374 382->379 385->371 386->360 392 405f17-405f26 call 4056ca call 406428 386->392 387->351 397 405eae-405eb1 call 4056ca 388->397 398 405e8f-405e92 388->398 389->379 393 405e77-405e80 call 405d74 389->393 392->351 393->379 397->379 401 405e94-405ea4 call 4056ca call 406428 398->401 402 405ea6-405eac 398->402 401->379 402->379
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,76233420,76232EE0,00000000), ref: 00405D9D
                                                                                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,?,?,76233420,76232EE0,00000000), ref: 00405DE5
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,?,?,76233420,76232EE0,00000000), ref: 00405E08
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,?,?,76233420,76232EE0,00000000), ref: 00405E0E
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*,?,?,76233420,76232EE0,00000000), ref: 00405E1E
                                                                                                                                                                                                  • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00405ECD
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                  • String ID: .$.$C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\*.*$\*.*
                                                                                                                                                                                                  • API String ID: 2035342205-2227653909
                                                                                                                                                                                                  • Opcode ID: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                                                                                                                                                  • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                                                                                                                                                                                  • Opcode Fuzzy Hash: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 589 406d5f-406d64 590 406dd5-406df3 589->590 591 406d66-406d95 589->591 592 4073cb-4073e0 590->592 593 406d97-406d9a 591->593 594 406d9c-406da0 591->594 595 4073e2-4073f8 592->595 596 4073fa-407410 592->596 597 406dac-406daf 593->597 598 406da2-406da6 594->598 599 406da8 594->599 600 407413-40741a 595->600 596->600 601 406db1-406dba 597->601 602 406dcd-406dd0 597->602 598->597 599->597 606 407441-40744d 600->606 607 40741c-407420 600->607 603 406dbc 601->603 604 406dbf-406dcb 601->604 605 406fa2-406fc0 602->605 603->604 608 406e35-406e63 604->608 612 406fc2-406fd6 605->612 613 406fd8-406fea 605->613 615 406be3-406bec 606->615 609 407426-40743e 607->609 610 4075cf-4075d9 607->610 616 406e65-406e7d 608->616 617 406e7f-406e99 608->617 609->606 614 4075e5-4075f8 610->614 618 406fed-406ff7 612->618 613->618 622 4075fd-407601 614->622 619 406bf2 615->619 620 4075fa 615->620 621 406e9c-406ea6 616->621 617->621 623 406ff9 618->623 624 406f9a-406fa0 618->624 626 406bf9-406bfd 619->626 627 406d39-406d5a 619->627 628 406c9e-406ca2 619->628 629 406d0e-406d12 619->629 620->622 631 406eac 621->631 632 406e1d-406e23 621->632 640 407581-40758b 623->640 641 406f7f-406f97 623->641 624->605 630 406f3e-406f48 624->630 626->614 633 406c03-406c10 626->633 627->592 642 406ca8-406cc1 628->642 643 40754e-407558 628->643 634 406d18-406d2c 629->634 635 40755d-407567 629->635 636 40758d-407597 630->636 637 406f4e-407117 630->637 648 406e02-406e1a 631->648 649 407569-407573 631->649 638 406ed6-406edc 632->638 639 406e29-406e2f 632->639 633->620 647 406c16-406c5c 633->647 650 406d2f-406d37 634->650 635->614 636->614 637->615 645 406f3a 638->645 646 406ede-406efc 638->646 639->608 639->645 640->614 641->624 652 406cc4-406cc8 642->652 643->614 645->630 653 406f14-406f26 646->653 654 406efe-406f12 646->654 655 406c84-406c86 647->655 656 406c5e-406c62 647->656 648->632 649->614 650->627 650->629 652->628 657 406cca-406cd0 652->657 660 406f29-406f33 653->660 654->660 663 406c94-406c9c 655->663 664 406c88-406c92 655->664 661 406c64-406c67 GlobalFree 656->661 662 406c6d-406c7b GlobalAlloc 656->662 658 406cd2-406cd9 657->658 659 406cfa-406d0c 657->659 665 406ce4-406cf4 GlobalAlloc 658->665 666 406cdb-406cde GlobalFree 658->666 659->650 660->638 667 406f35 660->667 661->662 662->620 668 406c81 662->668 663->652 664->663 664->664 665->620 665->659 666->665 670 407575-40757f 667->670 671 406ebb-406ed3 667->671 668->655 670->614 671->638
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                                                                                                                                  • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50, 4#v.#v,?,76232EE0,00405D94,?,76233420,76232EE0), ref: 004069A9
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 004069B5
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2295610775-0
                                                                                                                                                                                                  • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                                                                                                                                  • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 141 403d17-403d2f call 406a35 144 403d31-403d41 call 4065af 141->144 145 403d43-403d7a call 406536 141->145 154 403d9d-403dc6 call 403fed call 40603f 144->154 150 403d92-403d98 lstrcatW 145->150 151 403d7c-403d8d call 406536 145->151 150->154 151->150 159 403e58-403e60 call 40603f 154->159 160 403dcc-403dd1 154->160 166 403e62-403e69 call 4066a5 159->166 167 403e6e-403e93 LoadImageW 159->167 160->159 162 403dd7-403dff call 406536 160->162 162->159 168 403e01-403e05 162->168 166->167 170 403f14-403f1c call 40140b 167->170 171 403e95-403ec5 RegisterClassW 167->171 172 403e17-403e23 lstrlenW 168->172 173 403e07-403e14 call 405f64 168->173 184 403f26-403f31 call 403fed 170->184 185 403f1e-403f21 170->185 174 403fe3 171->174 175 403ecb-403f0f SystemParametersInfoW CreateWindowExW 171->175 179 403e25-403e33 lstrcmpiW 172->179 180 403e4b-403e53 call 405f37 call 406668 172->180 173->172 178 403fe5-403fec 174->178 175->170 179->180 183 403e35-403e3f GetFileAttributesW 179->183 180->159 187 403e41-403e43 183->187 188 403e45-403e46 call 405f83 183->188 194 403f37-403f51 ShowWindow call 4069c5 184->194 195 403fba-403fc2 call 40579d 184->195 185->178 187->180 187->188 188->180 200 403f53-403f58 call 4069c5 194->200 201 403f5d-403f6f GetClassInfoW 194->201 202 403fc4-403fca 195->202 203 403fdc-403fde call 40140b 195->203 200->201 206 403f71-403f81 GetClassInfoW RegisterClassW 201->206 207 403f87-403fb8 DialogBoxParamW call 40140b call 403c67 201->207 202->185 208 403fd0-403fd7 call 40140b 202->208 203->174 206->207 207->178 208->185
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                                                                                                                                    • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                                                                                                                                  • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76233420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D98
                                                                                                                                                                                                  • lstrlenW.KERNEL32(get,?,?,?,get,00000000,C:\Users\user\PCAppStore,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76233420), ref: 00403E18
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,.exe,get,?,?,?,get,00000000,C:\Users\user\PCAppStore,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(get,?,00000000,?), ref: 00403E36
                                                                                                                                                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\PCAppStore), ref: 00403E7F
                                                                                                                                                                                                    • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                                                                                                                                  • RegisterClassW.USER32(00429200), ref: 00403EBC
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                                                                                                                                                                                  • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                                                                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                                                                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                                                                                                                                                                                  • RegisterClassW.USER32(00429200), ref: 00403F81
                                                                                                                                                                                                  • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                  • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\PCAppStore$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$get
                                                                                                                                                                                                  • API String ID: 1975747703-3588531748
                                                                                                                                                                                                  • Opcode ID: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                                                                                                                                                                                  • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 215 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 218 403120-403125 215->218 219 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 215->219 220 40336a-40336e 218->220 227 403243-403251 call 40302e 219->227 228 40315e 219->228 234 403322-403327 227->234 235 403257-40325a 227->235 230 403163-40317a 228->230 232 40317c 230->232 233 40317e-403187 call 4035e2 230->233 232->233 241 40318d-403194 233->241 242 4032de-4032e6 call 40302e 233->242 234->220 237 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 235->237 238 40325c-403274 call 4035f8 call 4035e2 235->238 266 4032d4-4032d9 237->266 267 4032e8-403318 call 4035f8 call 403371 237->267 238->234 261 40327a-403280 238->261 246 403210-403214 241->246 247 403196-4031aa call 406113 241->247 242->234 251 403216-40321d call 40302e 246->251 252 40321e-403224 246->252 247->252 264 4031ac-4031b3 247->264 251->252 257 403233-40323b 252->257 258 403226-403230 call 406b22 252->258 257->230 265 403241 257->265 258->257 261->234 261->237 264->252 270 4031b5-4031bc 264->270 265->227 266->220 276 40331d-403320 267->276 270->252 272 4031be-4031c5 270->272 272->252 273 4031c7-4031ce 272->273 273->252 275 4031d0-4031f0 273->275 275->234 277 4031f6-4031fa 275->277 276->234 278 403329-40333a 276->278 279 403202-40320a 277->279 280 4031fc-403200 277->280 281 403342-403347 278->281 282 40333c 278->282 279->252 283 40320c-40320e 279->283 280->265 280->279 284 403348-40334e 281->284 282->281 283->252 284->284 285 403350-403368 call 406113 284->285 285->220
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 004030E4
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,00000400), ref: 00403100
                                                                                                                                                                                                    • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                    • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 00403149
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 0040328B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nspF85F.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                                  • API String ID: 2803837635-352856172
                                                                                                                                                                                                  • Opcode ID: dff409350d06ce17b221650d583fb97333c6afb1e6ebf9b4c6eec62bfd946937
                                                                                                                                                                                                  • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dff409350d06ce17b221650d583fb97333c6afb1e6ebf9b4c6eec62bfd946937
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 288 4066a5-4066b0 289 4066b2-4066c1 288->289 290 4066c3-4066d9 288->290 289->290 291 4066f1-4066fa 290->291 292 4066db-4066e8 290->292 294 406700 291->294 295 4068d5-4068e0 291->295 292->291 293 4066ea-4066ed 292->293 293->291 296 406705-406712 294->296 297 4068e2-4068e6 call 406668 295->297 298 4068eb-4068ec 295->298 296->295 299 406718-406721 296->299 297->298 301 4068b3 299->301 302 406727-406764 299->302 303 4068c1-4068c4 301->303 304 4068b5-4068bf 301->304 305 406857-40685c 302->305 306 40676a-406771 302->306 307 4068c6-4068cf 303->307 304->307 308 40685e-406864 305->308 309 40688f-406894 305->309 310 406773-406775 306->310 311 406776-406778 306->311 307->295 312 406702 307->312 313 406874-406880 call 406668 308->313 314 406866-406872 call 4065af 308->314 317 4068a3-4068b1 lstrlenW 309->317 318 406896-40689e call 4066a5 309->318 310->311 315 4067b5-4067b8 311->315 316 40677a-4067a1 call 406536 311->316 312->296 329 406885-40688b 313->329 314->329 319 4067c8-4067cb 315->319 320 4067ba-4067c6 GetSystemDirectoryW 315->320 333 40683e-406842 316->333 335 4067a7-4067b0 call 4066a5 316->335 317->307 318->317 326 406834-406836 319->326 327 4067cd-4067db GetWindowsDirectoryW 319->327 325 406838-40683c 320->325 325->333 334 40684f-406855 call 4068ef 325->334 326->325 332 4067dd-4067e5 326->332 327->326 329->317 331 40688d 329->331 331->334 339 4067e7-4067f0 332->339 340 4067fc-406812 SHGetSpecialFolderLocation 332->340 333->334 336 406844-40684a lstrcatW 333->336 334->317 335->325 336->334 345 4067f8-4067fa 339->345 343 406830 340->343 344 406814-40682e SHGetPathFromIDListW CoTaskMemFree 340->344 343->326 344->325 344->343 345->325 345->340
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(get,00000400), ref: 004067C0
                                                                                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(get,00000400,00000000,00422728,?,00405701,00422728,00000000,00000000,00000000,00000000), ref: 004067D3
                                                                                                                                                                                                  • lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                  • lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                                                                                                                                  • String ID: 5035937$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$get
                                                                                                                                                                                                  • API String ID: 4260037668-2594229988
                                                                                                                                                                                                  • Opcode ID: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                                                                                                                                  • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 410 40176f-401794 call 402da6 call 405fae 415 401796-40179c call 406668 410->415 416 40179e-4017b0 call 406668 call 405f37 lstrcatW 410->416 421 4017b5-4017b6 call 4068ef 415->421 416->421 425 4017bb-4017bf 421->425 426 4017c1-4017cb call 40699e 425->426 427 4017f2-4017f5 425->427 434 4017dd-4017ef 426->434 435 4017cd-4017db CompareFileTime 426->435 428 4017f7-4017f8 call 406133 427->428 429 4017fd-401819 call 406158 427->429 428->429 437 40181b-40181e 429->437 438 40188d-4018b6 call 4056ca call 403371 429->438 434->427 435->434 439 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 437->439 440 40186f-401879 call 4056ca 437->440 450 4018b8-4018bc 438->450 451 4018be-4018ca SetFileTime 438->451 439->425 472 401864-401865 439->472 452 401882-401888 440->452 450->451 454 4018d0-4018db CloseHandle 450->454 451->454 455 402c33 452->455 457 4018e1-4018e4 454->457 458 402c2a-402c2d 454->458 459 402c35-402c39 455->459 462 4018e6-4018f7 call 4066a5 lstrcatW 457->462 463 4018f9-4018fc call 4066a5 457->463 458->455 469 401901-4023a2 call 405cc8 462->469 463->469 469->458 469->459 472->452 474 401867-401868 472->474 474->440
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrcatW.KERNEL32(00000000,00000000,get,C:\Users\user\PCAppStore,?,?,00000031), ref: 004017B0
                                                                                                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,C:\Users\user\PCAppStore,?,?,00000031), ref: 004017D5
                                                                                                                                                                                                    • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                    • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp$C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dll$C:\Users\user\PCAppStore$get
                                                                                                                                                                                                  • API String ID: 1941528284-651929391
                                                                                                                                                                                                  • Opcode ID: 8a10f81b580edd96727de623d2cb72512ccae63576be40aac63ba19ed1c47bc7
                                                                                                                                                                                                  • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8a10f81b580edd96727de623d2cb72512ccae63576be40aac63ba19ed1c47bc7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 476 4069c5-4069e5 GetSystemDirectoryW 477 4069e7 476->477 478 4069e9-4069eb 476->478 477->478 479 4069fc-4069fe 478->479 480 4069ed-4069f6 478->480 482 4069ff-406a32 wsprintfW LoadLibraryExW 479->482 480->479 481 4069f8-4069fa 480->481 481->482
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00406A17
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                                                  • String ID: %s%S.dll$UXTHEME$\
                                                                                                                                                                                                  • API String ID: 2200240437-1946221925
                                                                                                                                                                                                  • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                                                                                                                                  • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2667972263-0
                                                                                                                                                                                                  • Opcode ID: 3dd095c025195d1a428b75d74b89fb792f772f3b0487a4c6f2200001eeea121b
                                                                                                                                                                                                  • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3dd095c025195d1a428b75d74b89fb792f772f3b0487a4c6f2200001eeea121b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 519 405b99-405be4 CreateDirectoryW 520 405be6-405be8 519->520 521 405bea-405bf7 GetLastError 519->521 522 405c11-405c13 520->522 521->522 523 405bf9-405c0d SetFileSecurityW 521->523 523->520 524 405c0f GetLastError 523->524 524->522
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405BF0
                                                                                                                                                                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405C0F
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BBF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 3449924974-3936084776
                                                                                                                                                                                                  • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                                                                                                                                  • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 525 40248a-4024bb call 402da6 * 2 call 402e36 532 4024c1-4024cb 525->532 533 402c2a-402c39 525->533 535 4024cd-4024da call 402da6 lstrlenW 532->535 536 4024de-4024e1 532->536 535->536 539 4024e3-4024f4 call 402d84 536->539 540 4024f5-4024f8 536->540 539->540 543 402509-40251d RegSetValueExW 540->543 544 4024fa-402504 call 403371 540->544 546 402522-402603 RegCloseKey 543->546 547 40251f 543->547 544->543 546->533 550 40292e-402935 546->550 547->546 550->533
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi40C2.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                                                                                                                                                  • RegSetValueExW.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp,00000000,00000011,00000002), ref: 00402515
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseValuelstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp
                                                                                                                                                                                                  • API String ID: 2655323295-1447767994
                                                                                                                                                                                                  • Opcode ID: 0c53a365a9c608e81ef79c85193ab9a3ad89e5c6fa2fbf23b50052b3995ee250
                                                                                                                                                                                                  • Instruction ID: a516967871aadb8e7373f7254d3c24ec0cdbd982f2b4049ed7d94b0996b6da2b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c53a365a9c608e81ef79c85193ab9a3ad89e5c6fa2fbf23b50052b3995ee250
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4011AF71E00108BEEF10AFA1CE49EAEB6B8EB44354F11443AF404B61C1DBB98D409658

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 551 40603f-40605a call 406668 call 405fe2 556 406060-40606d call 4068ef 551->556 557 40605c-40605e 551->557 561 40607d-406081 556->561 562 40606f-406075 556->562 558 4060b8-4060ba 557->558 564 406097-4060a0 lstrlenW 561->564 562->557 563 406077-40607b 562->563 563->557 563->561 565 4060a2-4060b6 call 405f37 GetFileAttributesW 564->565 566 406083-40608a call 40699e 564->566 565->558 571 406091-406092 call 405f83 566->571 572 40608c-40608f 566->572 571->564 572->557 572->571
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50, 4#v.#v,?,76232EE0,00405D94,?,76233420,76232EE0,00000000), ref: 00405FF0
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                                                                                                                                  • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50, 4#v.#v,?,76232EE0,00405D94,?,76233420,76232EE0,00000000), ref: 00406098
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50, 4#v.#v,?,76232EE0,00405D94,?,76233420,76232EE0), ref: 004060A8
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                                                  • String ID: 4#v.#v$P_B
                                                                                                                                                                                                  • API String ID: 3248276644-819321360
                                                                                                                                                                                                  • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                                                                                                                                  • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 574 406187-406193 575 406194-4061c8 GetTickCount GetTempFileNameW 574->575 576 4061d7-4061d9 575->576 577 4061ca-4061cc 575->577 579 4061d1-4061d4 576->579 577->575 578 4061ce 577->578 578->579
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 004061A5
                                                                                                                                                                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 004061C0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                                                  • API String ID: 1716503409-1857211195
                                                                                                                                                                                                  • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                                                                                                                                  • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 580 403c25-403c34 581 403c40-403c48 580->581 582 403c36-403c39 CloseHandle 580->582 583 403c54-403c60 call 403c82 call 405d74 581->583 584 403c4a-403c4d CloseHandle 581->584 582->581 588 403c65-403c66 583->588 584->583
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C37
                                                                                                                                                                                                  • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C4B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\, xrefs: 00403C5B
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C2A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\
                                                                                                                                                                                                  • API String ID: 2962429428-527959929
                                                                                                                                                                                                  • Opcode ID: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                                                                                                                                                  • Instruction ID: ab9e488bef71b432d29da19662b82269d7b8f1628316f3e3d8f7e3aa77a32ace
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3BE0863244471496E5246F7DAF4D9853B285F413357248726F178F60F0C7389A9B4A9D

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 672 4015c1-4015d5 call 402da6 call 405fe2 677 401631-401634 672->677 678 4015d7-4015ea call 405f64 672->678 679 401663-4022f6 call 401423 677->679 680 401636-401655 call 401423 call 406668 SetCurrentDirectoryW 677->680 685 401604-401607 call 405c16 678->685 686 4015ec-4015ef 678->686 696 402c2a-402c39 679->696 697 40292e-402935 679->697 680->696 699 40165b-40165e 680->699 695 40160c-40160e 685->695 686->685 689 4015f1-4015f8 call 405c33 686->689 689->685 703 4015fa-4015fd call 405b99 689->703 701 401610-401615 695->701 702 401627-40162f 695->702 697->696 699->696 705 401624 701->705 706 401617-401622 GetFileAttributesW 701->706 702->677 702->678 708 401602 703->708 705->702 706->702 706->705 708->695
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50, 4#v.#v,?,76232EE0,00405D94,?,76233420,76232EE0,00000000), ref: 00405FF0
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                                                                                                                    • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                                                                                                                    • Part of subcall function 00405B99: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\PCAppStore,?,00000000,000000F0), ref: 0040164D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\PCAppStore, xrefs: 00401640
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                                                  • String ID: C:\Users\user\PCAppStore
                                                                                                                                                                                                  • API String ID: 1892508949-4217928965
                                                                                                                                                                                                  • Opcode ID: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                                                                                                                                                                                  • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                                                                                                                                  • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                                                                                                                                  • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                                                                                                                                  • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                                                                                                                                  • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                                                                                                                                  • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                                                                                                                                  • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                                                                                                                                  • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 0040348D
                                                                                                                                                                                                    • Part of subcall function 004035F8: SetFilePointer.KERNEL32(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(12F863E4,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FilePointer$CountTick
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1092082344-0
                                                                                                                                                                                                  • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                                                                                                                                  • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                    • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 334405425-0
                                                                                                                                                                                                  • Opcode ID: 52f8d756bd50154f6a3dea7293860066d65bf9effb7e174b318ab9c425843f66
                                                                                                                                                                                                  • Instruction ID: 1e7e134340f86907485d462c64894228b35b3344cd4f3d252167f9901203d809
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 52f8d756bd50154f6a3dea7293860066d65bf9effb7e174b318ab9c425843f66
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C521C231904104FADF11AFA5CF48A9D7A70BF48354F60413BF605B91E0DBBD8A929A5D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GlobalFree.KERNEL32(0385E9E8), ref: 00401C0B
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C1D
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Global$AllocFreelstrcatlstrlen
                                                                                                                                                                                                  • String ID: get
                                                                                                                                                                                                  • API String ID: 3292104215-4248514160
                                                                                                                                                                                                  • Opcode ID: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                                                                                                                                                                                  • Instruction ID: d74cddccbdd50a14e5bf5e3e63826a63b2a65df0fd836753f00777670cd3b466
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5321D872904210DBDB20EFA4DEC4E5E73A4AB047157150A3BF542F72D0D6BD9C518BAD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Enum$CloseValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 397863658-0
                                                                                                                                                                                                  • Opcode ID: a2874957321bf6034ab335a01143add9f6f6121a8284cc98450072ad0413cc1f
                                                                                                                                                                                                  • Instruction ID: fdd171a53236be04b49e80cc8c25aaf428e2db1c32e81cf7e645575326a8d696
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a2874957321bf6034ab335a01143add9f6f6121a8284cc98450072ad0413cc1f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 35017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61D0EBB85E45966D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00406133: GetFileAttributesW.KERNEL32(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                                                                                                                                                    • Part of subcall function 00406133: SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                                                                                                                                                  • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405F0E), ref: 00405D47
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,00405F0E), ref: 00405D4F
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D67
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Attributes$DeleteDirectoryRemove
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1655745494-0
                                                                                                                                                                                                  • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                                                                                                                                                                                  • Instruction ID: f7500ddcb6900c42920b0fa7cdf939b3a50fd8fb6693fff67202f671924a8b23
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6DE0E531218A9156C3207734AD0CB5B2A98EF86314F09893FF5A2B11E0D77885078AAD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\PCAppStore, xrefs: 00402269
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateInstance
                                                                                                                                                                                                  • String ID: C:\Users\user\PCAppStore
                                                                                                                                                                                                  • API String ID: 542301482-4217928965
                                                                                                                                                                                                  • Opcode ID: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                                                                                                                                                                                  • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegOpenKeyExW.KERNEL32(00000000,00000000,00000000,?,?,00422728,?,('B,00406563,('B,00000000,?,?,get,?), ref: 004064F9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Open
                                                                                                                                                                                                  • String ID: ('B
                                                                                                                                                                                                  • API String ID: 71445658-2332581011
                                                                                                                                                                                                  • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                  • Instruction ID: 5036765eb4ab6e58186d81024f5778724aa2024cd81e2e1d5ca813995cf5404a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BAD0123210020DBBDF115F90AD01FAB375DAB08310F018426FE06A4092D775D534A728
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FilePointer
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 973152223-0
                                                                                                                                                                                                  • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                                                                                                                                  • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                                                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi40C2.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseQueryValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3356406503-0
                                                                                                                                                                                                  • Opcode ID: 2f519eafec3af35988992028302c1fe2ffbfb85c9afca13b7af9384ace0fec36
                                                                                                                                                                                                  • Instruction ID: eaee0c709954dca67eb2d1c59e66f6ca2c08a593dad46a4828cc6951ae7b5872
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2f519eafec3af35988992028302c1fe2ffbfb85c9afca13b7af9384ace0fec36
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5C116D71900219EBDF14DFA4DE589AE7774FF04345B20443BE401B62D0E7B88A45EB5D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                  • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                                                                                                                                  • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3712363035-0
                                                                                                                                                                                                  • Opcode ID: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                                                                                                                                  • Instruction ID: 91309136e62a13352d93043ad9bb7922807806bb2ea2f765c8e9c4a894a003d9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 59E0B6B4600209BFFB109B64EE09F7B7BADFB04648F414565BD51F2190D778A8158A78
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                                                                                                                                    • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                                                                                                                                    • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                                                                                                                                                                                                    • Part of subcall function 004069C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2547128583-0
                                                                                                                                                                                                  • Opcode ID: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                                                                                                                                                                                  • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,76233420,00000000,76232EE0,00403C59,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C9C
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00403CA3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Free$GlobalLibrary
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1100898210-0
                                                                                                                                                                                                  • Opcode ID: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                                                                                                                                                                                  • Instruction ID: 1b4b668df254a36c82b8f96f79c5ae0e05fb6c29bd97d86a5de4613e9375b038
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0AE08C335052205BD6211F55EA0875A7768AF94B26F06006AE980BB26087781C424BC8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$AttributesCreate
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 415043291-0
                                                                                                                                                                                                  • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                                                                                                                                  • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AttributesFile
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3188754299-0
                                                                                                                                                                                                  • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                  • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405C2A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1375471231-0
                                                                                                                                                                                                  • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                                                                                                                                  • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 0040652C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Create
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2289755597-0
                                                                                                                                                                                                  • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                  • Instruction ID: 390987c888b9fe28ccc3a202ccefe0e129b8fdbaba7b34d45eb5723cdb444700
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1E0ECB2010109BEEF099F90EC0ADBB372DEB04704F41492EF907E4091E6B5AE70AA34
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • WriteFile.KERNEL32(?,00000000,00000000,00000000,00000000,0040CFC2,0040CEF0,00403579,0040CEF0,0040CFC2,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileWrite
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3934441357-0
                                                                                                                                                                                                  • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                  • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ReadFile.KERNEL32(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                                                                                  • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                  • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FilePointer
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 973152223-0
                                                                                                                                                                                                  • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                  • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                    • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                    • Part of subcall function 00405C4B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                                                                                                                                    • Part of subcall function 00405C4B: CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                                                                                                    • Part of subcall function 00406AE0: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406AF1
                                                                                                                                                                                                    • Part of subcall function 00406AE0: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B13
                                                                                                                                                                                                    • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2972824698-0
                                                                                                                                                                                                  • Opcode ID: 39558c5643c496eaffaca9d6483fe6d6b72d5b00fb47a50e88cd8089dc569f6d
                                                                                                                                                                                                  • Instruction ID: 7fe263eab699b123ac8c37dffe14ee58438593542e676086741668bd6549bbba
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 39558c5643c496eaffaca9d6483fe6d6b72d5b00fb47a50e88cd8089dc569f6d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3DF09072905112EBDF21BBA59AC4DAE76A4DF01318B25453BE102B21E0D77C4E528A6E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 00405867
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 004058B3
                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 00405956
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                                                                                                                                                                    • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004059DE
                                                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 00405A02
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 00405A07
                                                                                                                                                                                                  • ShowWindow.USER32(00000008), ref: 00405A51
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00405A96
                                                                                                                                                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00405ACA
                                                                                                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                                                                                                                                                                                  • OpenClipboard.USER32(00000000), ref: 00405B2B
                                                                                                                                                                                                  • EmptyClipboard.USER32 ref: 00405B31
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                                                                                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00405B8C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                                                  • String ID: H7B${
                                                                                                                                                                                                  • API String ID: 590372296-2256286769
                                                                                                                                                                                                  • Opcode ID: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                                                                                                                                                  • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00405054
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                                                                                                                                                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                                                                                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 0040512B
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                                                                                                                                                                    • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 0040528D
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 0040546B
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 00405615
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 00405627
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                  • String ID: $M$N
                                                                                                                                                                                                  • API String ID: 2564846305-813528018
                                                                                                                                                                                                  • Opcode ID: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                                                                                                                                  • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                                                                                                                                                                                  • ShowWindow.USER32(?), ref: 00404121
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 0040414C
                                                                                                                                                                                                  • DestroyWindow.USER32 ref: 00404160
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                                                                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00404198
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                                                                                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00404268
                                                                                                                                                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                                                                                                                                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 00404379
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 0040439A
                                                                                                                                                                                                  • EnableWindow.USER32(?,?), ref: 004043AC
                                                                                                                                                                                                  • EnableWindow.USER32(?,?), ref: 004043C7
                                                                                                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                                                                                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 004043E4
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                                                                                                                                                                                  • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                                                                                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 00404581
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                                                                                  • String ID: H7B
                                                                                                                                                                                                  • API String ID: 1860320154-2300413410
                                                                                                                                                                                                  • Opcode ID: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                                                                                                                                  • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                                                                                                                                                                                  • GetSysColor.USER32(?), ref: 00404863
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?), ref: 00404884
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                                                                                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                                                                                                                                                                                  • SendMessageW.USER32(00000000), ref: 00404906
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 00404985
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 004049A1
                                                                                                                                                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                                                                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                                                                  • String ID: N$get
                                                                                                                                                                                                  • API String ID: 3103080414-214687294
                                                                                                                                                                                                  • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                                                                                                                                  • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                                                                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(get,00423748,00000000,?,?), ref: 00404C1C
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,get), ref: 00404C28
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                                                                                                                                                                    • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                                                                                                                                                                    • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                                                                                                                                    • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                                                                                                                                    • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                                                                                                                                    • Part of subcall function 004068EF: CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                                                                                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                                                                                                                                                                    • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                                                                                                                                    • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                                                                                                                                                                    • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                  • String ID: 5035937$A$C:\Users\user\PCAppStore$H7B$get
                                                                                                                                                                                                  • API String ID: 2624150263-2438904852
                                                                                                                                                                                                  • Opcode ID: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                                                                                                                                  • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                                                                                                                                                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                                                                                                                                                                    • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                                                                                                                                    • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                                                                                                                                  • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                                                                                                                                                                                  • wsprintfA.USER32 ref: 0040632D
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                                                                                                                                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00406416
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                                                                                                                                                                    • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 0040615C
                                                                                                                                                                                                    • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                                                                  • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                                                                                                                                                                                  • API String ID: 2171350718-2295842750
                                                                                                                                                                                                  • Opcode ID: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                                                                                                                                  • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                                                  • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                  • String ID: F
                                                                                                                                                                                                  • API String ID: 941294808-1304234792
                                                                                                                                                                                                  • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                                                                                                                                  • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                  • lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                  • lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                  • SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                                                                                                                                  • String ID: ('B
                                                                                                                                                                                                  • API String ID: 1495540970-2332581011
                                                                                                                                                                                                  • Opcode ID: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                                                                                                                                  • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                                                                                                                                                                                  • Opcode Fuzzy Hash: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                                                                                                                                                                                  • GetSysColor.USER32(00000000), ref: 00404686
                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404692
                                                                                                                                                                                                  • SetBkMode.GDI32(?,?), ref: 0040469E
                                                                                                                                                                                                  • GetSysColor.USER32(?), ref: 004046B1
                                                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 004046C1
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004046DB
                                                                                                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2320649405-0
                                                                                                                                                                                                  • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                  • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                                                                                                                    • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                                                                                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                                                  • String ID: 9
                                                                                                                                                                                                  • API String ID: 163830602-2366072709
                                                                                                                                                                                                  • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                                                                                                                                  • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                                                                                                                                  • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                                                                                                                                  • CharNextW.USER32(?,00000000,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                                                                                                                                  • CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                                                                                                  • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 589700163-826357637
                                                                                                                                                                                                  • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                                                                                                                                  • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00403049
                                                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 00403067
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00403095
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                                                                                                                    • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                                                                                                                                                    • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                                                                                                                    • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                                                                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                                                                                                                                                                    • Part of subcall function 00403012: MulDiv.KERNEL32(00000000,00000064,0001695E), ref: 00403027
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                                                                                  • String ID: ... %d%%
                                                                                                                                                                                                  • API String ID: 722711167-2449383134
                                                                                                                                                                                                  • Opcode ID: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                                                                                                                                                  • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                                                                                                                                                                                  • GetMessagePos.USER32 ref: 00404FA2
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00404FBC
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                  • String ID: f
                                                                                                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                                                                                                  • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                  • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00402FE5
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                                                                                  • API String ID: 1451636040-1158693248
                                                                                                                                                                                                  • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                                                                                                                                  • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00404F1B
                                                                                                                                                                                                  • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                  • String ID: %u.%u%s%s$H7B
                                                                                                                                                                                                  • API String ID: 3540041739-107966168
                                                                                                                                                                                                  • Opcode ID: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                                                                                                                                  • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                                                                                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseEnum$DeleteValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1354259210-0
                                                                                                                                                                                                  • Opcode ID: 953796069c20d6fa7490a0bfa1861ca0c616837e62ffc418281f2642f3cef6d6
                                                                                                                                                                                                  • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 953796069c20d6fa7490a0bfa1861ca0c616837e62ffc418281f2642f3cef6d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                                                                                                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1849352358-0
                                                                                                                                                                                                  • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                                                                                                                                  • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDC.USER32(?), ref: 00401E51
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                                                                                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                                                                                                                    • Part of subcall function 004066A5: lstrlenW.KERNEL32(get,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                                                                                                                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2584051700-0
                                                                                                                                                                                                  • Opcode ID: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                                                                                                                                  • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                                                                                                  • String ID: !
                                                                                                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                                                                                                  • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                                                                                                                                  • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,0040A230,00000000,('B,00000000,?,?,get,?,?,0040679D,80000002), ref: 0040657C
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,get,get,get,00000000,00422728), ref: 00406587
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseQueryValue
                                                                                                                                                                                                  • String ID: ('B$get
                                                                                                                                                                                                  • API String ID: 3356406503-1955485993
                                                                                                                                                                                                  • Opcode ID: abb8e2472c70d4d58aecb7d0dfcf889930bd109b5a1b9baac0574de2233c5019
                                                                                                                                                                                                  • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                                                                                                                                                                                  • Opcode Fuzzy Hash: abb8e2472c70d4d58aecb7d0dfcf889930bd109b5a1b9baac0574de2233c5019
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F3D
                                                                                                                                                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F47
                                                                                                                                                                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F37
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                  • API String ID: 2659869361-3936084776
                                                                                                                                                                                                  • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                  • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dll), ref: 00402695
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsi40C2.tmp$C:\Users\user\AppData\Local\Temp\nsi40C2.tmp\inetc.dll
                                                                                                                                                                                                  • API String ID: 1659193697-3876021631
                                                                                                                                                                                                  • Opcode ID: 9a86cc41fb3ba1d07c106fca7ec167276fc7dee72b5d11bed2732143b2a4cd05
                                                                                                                                                                                                  • Instruction ID: f1e3379d491753f9d96dc3c217618d2e64da59e9cc8309568291ba5d2d488428
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a86cc41fb3ba1d07c106fca7ec167276fc7dee72b5d11bed2732143b2a4cd05
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D511C472A00205EBCB10BBB18E4AA9E76619F44758F21483FE402B61C1DAFD8891965F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 0040566D
                                                                                                                                                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                                                                                                                                                                    • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                                                                                                  • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                                                                                                                                  • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp,0040313C,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 00405F89
                                                                                                                                                                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp,0040313C,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,C:\Users\user\AppData\Local\Temp\nspF85F.tmp,80000000,00000003), ref: 00405F99
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • C:\Users\user\AppData\Local\Temp, xrefs: 00405F83
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CharPrevlstrlen
                                                                                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp
                                                                                                                                                                                                  • API String ID: 2709904686-1104044542
                                                                                                                                                                                                  • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                                                                                                  • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                                                                                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                                                                                                                                                                                  • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000009.00000002.2903279243.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903231581.0000000000400000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903338550.0000000000408000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000040A000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000425000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000427000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042B000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.000000000042F000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000433000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000435000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000454000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903384109.0000000000457000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045D000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000009.00000002.2903910062.000000000045F000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_9_2_400000_nspF85F.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 190613189-0
                                                                                                                                                                                                  • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                                                                                                                                  • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798

                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                  Execution Coverage:13.9%
                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                  Signature Coverage:2.6%
                                                                                                                                                                                                  Total number of Nodes:2000
                                                                                                                                                                                                  Total number of Limit Nodes:78
                                                                                                                                                                                                  execution_graph 73276 7ff6ed8b6fb0 73279 7ff6ed8b2b40 73276->73279 73282 7ff6ed8b12f0 73279->73282 73283 7ff6ed8b1304 allocator 73282->73283 73286 7ff6ed8b1610 73283->73286 73287 7ff6ed8b1636 allocator _aligned_msize 73286->73287 73290 7ff6ed8b1580 73287->73290 73293 7ff6ed8b2830 73290->73293 73294 7ff6ed8b286a 73293->73294 73307 7ff6ed8717c0 73294->73307 73297 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 73298 7ff6ed8b2947 73297->73298 73299 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 73298->73299 73300 7ff6ed8b29a2 73299->73300 73301 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 73300->73301 73302 7ff6ed8b29ef 73301->73302 73303 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 73302->73303 73304 7ff6ed8b2a3c 73303->73304 73310 7ff6ed8b46e0 73304->73310 73624 7ff6ed8716f0 73307->73624 73309 7ff6ed8717dd 73309->73297 73311 7ff6ed8b46ff ctype std::_Fac_node::_Fac_node 73310->73311 73312 7ff6ed8b4767 CoInitializeEx 73311->73312 73657 7ff6ed8725a0 73312->73657 73317 7ff6ed8725a0 _Mpunct 51 API calls 73318 7ff6ed8b47d9 73317->73318 73319 7ff6ed8ba140 71 API calls 73318->73319 73320 7ff6ed8b47f6 73319->73320 73689 7ff6ed871940 73320->73689 73322 7ff6ed8b4801 allocator 73323 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 73322->73323 73324 7ff6ed8b483c 73323->73324 73694 7ff6ed8b9730 73324->73694 73625 7ff6ed871708 strrchr 73624->73625 73628 7ff6ed879ce0 73625->73628 73627 7ff6ed871717 UnDecorator::getVbTableType 73627->73309 73629 7ff6ed879d08 UnDecorator::getVbTableType 73628->73629 73630 7ff6ed879d2d UnDecorator::getVbTableType 73629->73630 73632 7ff6ed879d80 UnDecorator::getVbTableType 73629->73632 73634 7ff6ed880310 RtlPcToFileHeader RaiseException strrchr 73629->73634 73630->73627 73635 7ff6ed8927c0 73632->73635 73634->73632 73636 7ff6ed8927e7 73635->73636 73640 7ff6ed8927e0 memcpy_s 73635->73640 73637 7ff6ed892810 73636->73637 73642 7ff6ed89282a memcpy_s 73636->73642 73651 7ff6eda89580 11 API calls memcpy_s 73637->73651 73639 7ff6ed892815 73652 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 73639->73652 73640->73630 73642->73640 73643 7ff6ed89287d 73642->73643 73647 7ff6ed892894 73642->73647 73653 7ff6eda89580 11 API calls memcpy_s 73643->73653 73645 7ff6ed892882 73654 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 73645->73654 73647->73640 73655 7ff6eda89580 11 API calls memcpy_s 73647->73655 73649 7ff6ed8928c6 73656 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 73649->73656 73651->73639 73652->73640 73653->73645 73654->73640 73655->73649 73656->73640 73658 7ff6ed8725c7 allocator _Mpunct _WChar_traits 73657->73658 74015 7ff6ed86bdb0 73658->74015 73660 7ff6ed8725ec 73661 7ff6ed8ba140 73660->73661 73662 7ff6ed8725a0 _Mpunct 51 API calls 73661->73662 73663 7ff6ed8ba16d 73662->73663 74028 7ff6ed8b8a10 73663->74028 73673 7ff6ed8ba1e3 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= 74050 7ff6ed8b9270 73673->74050 73675 7ff6ed8ba2c9 Concurrency::details::WorkQueue::IsStructuredEmpty 74063 7ff6ed871820 73675->74063 73679 7ff6ed8ba21b shared_ptr 73679->73675 74075 7ff6ed8b8aa0 47 API calls 73679->74075 74076 7ff6ed8ba570 51 API calls 2 library calls 73679->74076 73682 7ff6ed8ba2f8 73683 7ff6ed875200 shared_ptr 47 API calls 73682->73683 73684 7ff6ed8ba306 73683->73684 73685 7ff6ed875200 shared_ptr 47 API calls 73684->73685 73686 7ff6ed8ba314 73685->73686 73687 7ff6ed875200 shared_ptr 47 API calls 73686->73687 73688 7ff6ed8b47b4 73687->73688 73688->73317 73690 7ff6ed87be40 57 API calls 73689->73690 73691 7ff6ed87194e 73690->73691 73692 7ff6ed871740 2 API calls 73691->73692 73693 7ff6ed87195b 73692->73693 73693->73322 73695 7ff6ed8b9756 allocator 73694->73695 73696 7ff6ed8725a0 _Mpunct 51 API calls 73695->73696 73697 7ff6ed8b9766 73696->73697 73698 7ff6ed875200 shared_ptr 47 API calls 73697->73698 73701 7ff6ed8b978a shared_ptr 73698->73701 73700 7ff6ed8b984b 73702 7ff6ed8b985c 73700->73702 73708 7ff6ed8b98a7 allocator 73700->73708 74170 7ff6ed8b8eb0 73701->74170 73703 7ff6ed871940 59 API calls 73702->73703 73704 7ff6ed8b9869 73703->73704 74182 7ff6ed8b8840 73704->74182 74185 7ff6ed869fd0 51 API calls 4 library calls 73708->74185 73711 7ff6ed8b993d allocator 74186 7ff6ed869fd0 51 API calls 4 library calls 73711->74186 73713 7ff6ed8b99f2 73714 7ff6ed8ba700 51 API calls 73713->73714 73715 7ff6ed8b9a10 Concurrency::details::WorkQueue::IsStructuredEmpty 73714->73715 73716 7ff6ed871880 67 API calls 73715->73716 74016 7ff6ed86bdd7 _Mpunct 74015->74016 74018 7ff6ed86bde3 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74016->74018 74021 7ff6ed884450 51 API calls _Mpunct 74016->74021 74020 7ff6ed86be1c allocator _Mpunct char_traits 74018->74020 74022 7ff6ed86b960 74018->74022 74020->73660 74021->74018 74025 7ff6ed86b8d0 74022->74025 74026 7ff6ed884520 allocator 49 API calls 74025->74026 74027 7ff6ed86b8f0 74026->74027 74027->74020 74029 7ff6ed8b8a2f 74028->74029 74030 7ff6ed8b8a67 74029->74030 74077 7ff6ed8b8aa0 47 API calls 74029->74077 74078 7ff6ed8a7f20 51 API calls 74029->74078 74032 7ff6ed875200 shared_ptr 47 API calls 74030->74032 74034 7ff6ed8b8a8b 74032->74034 74035 7ff6ed8b8e60 74034->74035 74036 7ff6ed8b8e89 Concurrency::details::WorkQueue::IsStructuredEmpty 74035->74036 74079 7ff6ed884820 74036->74079 74038 7ff6ed8b8ea2 74039 7ff6ed8ba700 74038->74039 74084 7ff6ed8724b0 74039->74084 74041 7ff6ed875200 shared_ptr 47 API calls 74042 7ff6ed8ba1b4 74041->74042 74044 7ff6ed8b89e0 74042->74044 74043 7ff6ed8ba730 Concurrency::details::HardwareAffinity::operator!= 74043->74041 74045 7ff6ed8b8e60 type_info::_name_internal_method 51 API calls 74044->74045 74046 7ff6ed8b89fd 74045->74046 74047 7ff6ed875200 74046->74047 74094 7ff6ed8842f0 74047->74094 74049 7ff6ed875213 Concurrency::details::HardwareAffinity::operator!= 74049->73673 74099 7ff6ed872330 74050->74099 74052 7ff6ed8b929f 74060 7ff6ed8b942e 74052->74060 74103 7ff6ed8b89b0 51 API calls Concurrency::task_continuation_context::task_continuation_context 74052->74103 74053 7ff6ed8b9587 std::ios_base::failure::failure 74054 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 74053->74054 74056 7ff6ed8b95ae 74054->74056 74055 7ff6ed8b955f 74055->74053 74105 7ff6ed8b89b0 51 API calls Concurrency::task_continuation_context::task_continuation_context 74055->74105 74058 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 74056->74058 74059 7ff6ed8b95b9 74058->74059 74059->73679 74060->74053 74060->74055 74104 7ff6ed8b89b0 51 API calls Concurrency::task_continuation_context::task_continuation_context 74060->74104 74112 7ff6ed87be40 74063->74112 74067 7ff6ed871840 74119 7ff6ed879c80 74067->74119 74070 7ff6ed871866 74072 7ff6ed8751d0 74070->74072 74165 7ff6ed884240 74072->74165 74074 7ff6ed8751e3 Concurrency::details::HardwareAffinity::operator!= 74074->73682 74075->73679 74076->73679 74077->74029 74078->74029 74080 7ff6ed8848df 74079->74080 74082 7ff6ed88485e Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct char_traits 74079->74082 74083 7ff6ed86f090 51 API calls 5 library calls 74080->74083 74082->74038 74083->74082 74085 7ff6ed8724d2 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl _aligned_msize 74084->74085 74088 7ff6ed86c240 74085->74088 74087 7ff6ed872536 74087->74043 74089 7ff6ed86c267 _Mpunct 74088->74089 74090 7ff6ed884450 _Mpunct 51 API calls 74089->74090 74091 7ff6ed86c276 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74089->74091 74090->74091 74092 7ff6ed86b960 _Mpunct 49 API calls 74091->74092 74093 7ff6ed86c2b2 allocator _Mpunct 74091->74093 74092->74093 74093->74087 74095 7ff6ed88430d Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74094->74095 74097 7ff6ed884349 shared_ptr char_traits 74095->74097 74098 7ff6ed880de0 47 API calls shared_ptr 74095->74098 74097->74049 74098->74097 74100 7ff6ed872357 allocator _Mpunct char_traits 74099->74100 74106 7ff6ed86bf40 74100->74106 74102 7ff6ed87237c 74102->74052 74103->74052 74104->74060 74105->74055 74107 7ff6ed86bf67 Concurrency::task_continuation_context::task_continuation_context 74106->74107 74108 7ff6ed884450 _Mpunct 51 API calls 74107->74108 74110 7ff6ed86bf73 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error _Mpunct Concurrency::task_continuation_context::task_continuation_context 74107->74110 74108->74110 74109 7ff6ed86bfac std::_Throw_Cpp_error allocator _Mpunct char_traits 74109->74102 74110->74109 74111 7ff6ed86b900 Concurrency::task_continuation_context::task_continuation_context 49 API calls 74110->74111 74111->74109 74136 7ff6ed87bec0 74112->74136 74115 7ff6ed871740 74116 7ff6ed87174e 74115->74116 74118 7ff6ed87178e UnDecorator::getVbTableType 74116->74118 74152 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 74116->74152 74118->74067 74120 7ff6ed871850 74119->74120 74121 7ff6ed879c9b 74119->74121 74120->74070 74123 7ff6ed8765b0 74120->74123 74121->74120 74153 7ff6ed87c180 57 API calls 74121->74153 74124 7ff6ed8765d0 74123->74124 74125 7ff6ed8765c6 74123->74125 74127 7ff6ed8765ed 74124->74127 74128 7ff6ed87662a 74124->74128 74154 7ff6ed87bd40 74125->74154 74157 7ff6ed87bdb0 74127->74157 74164 7ff6ed87aef0 RtlPcToFileHeader RaiseException strrchr Concurrency::task_continuation_context::task_continuation_context UnDecorator::getVbTableType 74128->74164 74133 7ff6ed876619 74161 7ff6ed87c6a0 74133->74161 74135 7ff6ed876627 74135->74070 74137 7ff6ed87bf2b 74136->74137 74138 7ff6ed87bee9 74136->74138 74140 7ff6ed871833 74137->74140 74141 7ff6eda8345c AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 74137->74141 74139 7ff6eda8345c AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 74138->74139 74142 7ff6ed87bef5 74139->74142 74140->74115 74145 7ff6ed87bf5d 74141->74145 74142->74137 74143 7ff6ed87befe GetProcessHeap 74142->74143 74144 7ff6ed87bf13 74143->74144 74146 7ff6eda8339c 50 API calls 74144->74146 74145->74140 74147 7ff6eda8339c 50 API calls 74145->74147 74148 7ff6ed87bf1f 74146->74148 74149 7ff6ed87bf85 74147->74149 74150 7ff6eda833f0 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 74148->74150 74151 7ff6eda833f0 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 74149->74151 74150->74137 74151->74140 74152->74116 74153->74120 74155 7ff6ed880550 74154->74155 74156 7ff6ed87bd4e MultiByteToWideChar 74155->74156 74156->74124 74158 7ff6ed87c330 strrchr 50 API calls 74157->74158 74159 7ff6ed8765fb 74158->74159 74160 7ff6ed879f30 MultiByteToWideChar 74159->74160 74160->74133 74162 7ff6ed87d970 Concurrency::task_continuation_context::task_continuation_context RtlPcToFileHeader RaiseException 74161->74162 74163 7ff6ed87c6bb 74162->74163 74163->74135 74164->74135 74166 7ff6ed88425d Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74165->74166 74168 7ff6ed884299 shared_ptr char_traits 74166->74168 74169 7ff6ed880da0 47 API calls Concurrency::task_continuation_context::task_continuation_context 74166->74169 74168->74074 74169->74168 74171 7ff6ed872330 _Mpunct 51 API calls 74170->74171 74181 7ff6ed8b8eda Concurrency::details::HardwareAffinity::operator!= 74171->74181 74172 7ff6ed8b9221 74173 7ff6ed8b8840 47 API calls 74172->74173 74175 7ff6ed8b9248 74173->74175 74174 7ff6ed8b90d8 74174->74172 74189 7ff6ed8ba6a0 51 API calls 74174->74189 74176 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 74175->74176 74178 7ff6ed8b9253 74176->74178 74178->73700 74181->74174 74187 7ff6ed8ba600 50 API calls 74181->74187 74188 7ff6ed8ba6a0 51 API calls 74181->74188 74190 7ff6ed8b8d90 74182->74190 74185->73711 74186->73713 74187->74181 74188->74181 74189->74174 74192 7ff6ed8b8da3 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74190->74192 74191 7ff6ed8b8853 74192->74191 74194 7ff6ed8863c0 47 API calls shared_ptr 74192->74194 74194->74191 74464 7ff6ed8c4b50 74467 7ff6eda96d2c 74464->74467 74468 7ff6eda96d66 74467->74468 74469 7ff6eda96d48 74467->74469 74488 7ff6eda968e0 EnterCriticalSection 74468->74488 74489 7ff6eda89580 11 API calls memcpy_s 74469->74489 74473 7ff6eda96d4d 74490 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 74473->74490 74486 7ff6ed8c4b68 74489->74473 74490->74486 74491 7ff6ed8a3891 74492 7ff6ed8a3901 74491->74492 74493 7ff6ed8a38a2 74491->74493 74499 7ff6ed876d30 74493->74499 74497 7ff6ed8a38d5 74506 7ff6ed8a72a0 13 API calls 2 library calls 74497->74506 74500 7ff6ed876d83 74499->74500 74501 7ff6ed876d44 74499->74501 74505 7ff6ed8a8600 93 API calls 74500->74505 74507 7ff6eda61918 74501->74507 74503 7ff6ed876d50 74511 7ff6eda61990 74503->74511 74505->74497 74506->74492 74508 7ff6eda61927 74507->74508 74510 7ff6eda6192c 74507->74510 74515 7ff6eda9ac24 6 API calls std::_Locinfo::_Locinfo_ctor 74508->74515 74510->74503 74512 7ff6eda6199b LeaveCriticalSection 74511->74512 74513 7ff6eda619a4 74511->74513 74513->74500 74516 7ff6ed88b0b0 74517 7ff6ed8725a0 _Mpunct 51 API calls 74516->74517 74518 7ff6ed88b0da 74517->74518 74519 7ff6ed8ba140 71 API calls 74518->74519 74520 7ff6ed88b0ee 74519->74520 74521 7ff6ed8725a0 _Mpunct 51 API calls 74520->74521 74522 7ff6ed88b10d 74521->74522 74523 7ff6ed8ba140 71 API calls 74522->74523 74524 7ff6ed88b121 74523->74524 74543 7ff6ed911fd0 ShowWindow 74524->74543 74526 7ff6ed88b136 74527 7ff6ed871880 67 API calls 74526->74527 74528 7ff6ed88b148 74527->74528 74529 7ff6ed871880 67 API calls 74528->74529 74530 7ff6ed88b15a 74529->74530 74531 7ff6ed871880 67 API calls 74530->74531 74532 7ff6ed88b16c 74531->74532 74533 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 74532->74533 74534 7ff6ed88b189 74533->74534 74535 7ff6ed8b9730 71 API calls 74534->74535 74536 7ff6ed88b1a6 74535->74536 74537 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 74536->74537 74538 7ff6ed88b1f0 74537->74538 74539 7ff6ed8b9730 71 API calls 74538->74539 74540 7ff6ed88b20d 74539->74540 74541 7ff6ed8fd260 76 API calls 74540->74541 74542 7ff6ed88b25e UnDecorator::getVbTableType 74541->74542 74544 7ff6ed911ffa UpdateWindow 74543->74544 74545 7ff6ed911fee 74543->74545 74544->74526 74545->74544 74546 7ff6ed8a6af0 74549 7ff6ed8a67f0 74546->74549 74548 7ff6ed8a6afc 74552 7ff6ed8a6770 74549->74552 74553 7ff6ed8a6796 std::bad_exception::bad_exception 74552->74553 74560 7ff6ed874110 74553->74560 74561 7ff6eda61918 std::_Lockit::_Lockit 6 API calls 74560->74561 74562 7ff6ed874134 _Yarn 74561->74562 74563 7ff6ed8741bb 74562->74563 74564 7ff6ed8741a9 74562->74564 74595 7ff6eda61e10 51 API calls 2 library calls 74563->74595 74588 7ff6eda6253c 74564->74588 74567 7ff6ed8741b8 74568 7ff6ed8a8b60 74567->74568 74633 7ff6ed881a70 74568->74633 74571 7ff6ed876140 74725 7ff6eda625a8 74571->74725 74576 7ff6ed875040 std::bad_exception::bad_exception 13 API calls 74577 7ff6ed876176 74576->74577 74578 7ff6ed875040 std::bad_exception::bad_exception 13 API calls 74577->74578 74579 7ff6ed876187 74578->74579 74580 7ff6ed875040 std::bad_exception::bad_exception 13 API calls 74579->74580 74581 7ff6ed876198 74580->74581 74582 7ff6ed875040 std::bad_exception::bad_exception 13 API calls 74581->74582 74583 7ff6ed8761a9 74582->74583 74584 7ff6ed875040 std::bad_exception::bad_exception 13 API calls 74583->74584 74585 7ff6ed8761ba 74584->74585 74586 7ff6eda61990 std::_Lockit::~_Lockit LeaveCriticalSection 74585->74586 74587 7ff6ed8761c7 74586->74587 74587->74548 74596 7ff6eda9af2c 74588->74596 74595->74567 74602 7ff6edaa4184 74596->74602 74623 7ff6edaa3758 5 API calls __crtLCMapStringW 74602->74623 74604 7ff6edaa41a4 74624 7ff6edaa3758 5 API calls __crtLCMapStringW 74604->74624 74606 7ff6edaa41c3 74625 7ff6edaa3758 5 API calls __crtLCMapStringW 74606->74625 74608 7ff6edaa41e2 74626 7ff6edaa3758 5 API calls __crtLCMapStringW 74608->74626 74610 7ff6edaa4201 74627 7ff6edaa3758 5 API calls __crtLCMapStringW 74610->74627 74612 7ff6edaa4220 74628 7ff6edaa3758 5 API calls __crtLCMapStringW 74612->74628 74614 7ff6edaa423f 74629 7ff6edaa3758 5 API calls __crtLCMapStringW 74614->74629 74616 7ff6edaa425e 74630 7ff6edaa3758 5 API calls __crtLCMapStringW 74616->74630 74618 7ff6edaa427d 74631 7ff6edaa3758 5 API calls __crtLCMapStringW 74618->74631 74620 7ff6edaa429c 74632 7ff6edaa3758 5 API calls __crtLCMapStringW 74620->74632 74622 7ff6edaa42bb 74623->74604 74624->74606 74625->74608 74626->74610 74627->74612 74628->74614 74629->74616 74630->74618 74631->74620 74632->74622 74636 7ff6eda628c0 74633->74636 74645 7ff6eda9afa8 74636->74645 74643 7ff6ed881a8a 74643->74571 74661 7ff6edaa0e8c GetLastError 74645->74661 74650 7ff6eda9b03c 74651 7ff6edaa0e8c __std_fs_code_page 47 API calls 74650->74651 74652 7ff6eda9b045 74651->74652 74653 7ff6edaa1300 __std_fs_code_page 47 API calls 74652->74653 74654 7ff6eda628ec 74653->74654 74655 7ff6eda9b008 74654->74655 74656 7ff6edaa0e8c __std_fs_code_page 47 API calls 74655->74656 74657 7ff6eda9b011 74656->74657 74658 7ff6edaa1300 __std_fs_code_page 47 API calls 74657->74658 74659 7ff6eda628f4 74658->74659 74659->74643 74660 7ff6eda9af78 47 API calls __std_fs_code_page 74659->74660 74660->74643 74662 7ff6edaa0eb0 FlsGetValue 74661->74662 74663 7ff6edaa0ecd FlsSetValue 74661->74663 74664 7ff6edaa0ec7 74662->74664 74681 7ff6edaa0ebd 74662->74681 74665 7ff6edaa0edf 74663->74665 74663->74681 74664->74663 74687 7ff6edaa11ec 74665->74687 74666 7ff6edaa0f39 SetLastError 74668 7ff6eda9afb1 74666->74668 74669 7ff6edaa0f59 74666->74669 74683 7ff6edaa1300 74668->74683 74701 7ff6eda90228 47 API calls __std_fs_directory_iterator_open 74669->74701 74672 7ff6edaa0f0c FlsSetValue 74676 7ff6edaa0f18 FlsSetValue 74672->74676 74677 7ff6edaa0f2a 74672->74677 74673 7ff6edaa0efc FlsSetValue 74675 7ff6edaa0f05 74673->74675 74694 7ff6edaa1264 74675->74694 74676->74675 74700 7ff6edaa0c3c 11 API calls __std_fs_code_page 74677->74700 74680 7ff6edaa0f32 74682 7ff6edaa1264 __free_lconv_mon 11 API calls 74680->74682 74681->74666 74682->74666 74684 7ff6edaa1315 74683->74684 74685 7ff6eda628e5 74683->74685 74684->74685 74712 7ff6edaadc9c 74684->74712 74685->74650 74693 7ff6edaa11fd __std_fs_code_page 74687->74693 74688 7ff6edaa124e 74705 7ff6eda89580 11 API calls memcpy_s 74688->74705 74689 7ff6edaa1232 HeapAlloc 74691 7ff6edaa0eee 74689->74691 74689->74693 74691->74672 74691->74673 74693->74688 74693->74689 74702 7ff6edaa048c 74693->74702 74695 7ff6edaa129a 74694->74695 74696 7ff6edaa1269 RtlFreeHeap 74694->74696 74695->74681 74696->74695 74697 7ff6edaa1284 GetLastError 74696->74697 74698 7ff6edaa1291 __free_lconv_mon 74697->74698 74711 7ff6eda89580 11 API calls memcpy_s 74698->74711 74700->74680 74706 7ff6edaa04cc 74702->74706 74705->74691 74707 7ff6eda9abb4 __std_fs_directory_iterator_open EnterCriticalSection 74706->74707 74708 7ff6edaa04d9 74707->74708 74709 7ff6eda9ac08 __std_fs_directory_iterator_open LeaveCriticalSection 74708->74709 74710 7ff6edaa049e 74709->74710 74710->74693 74711->74695 74713 7ff6edaa0e8c __std_fs_code_page 47 API calls 74712->74713 74714 7ff6edaadcab 74713->74714 74715 7ff6edaadcf6 74714->74715 74724 7ff6eda9abb4 EnterCriticalSection 74714->74724 74715->74685 74726 7ff6ed876153 74725->74726 74727 7ff6eda625b5 74725->74727 74729 7ff6ed875040 74726->74729 74728 7ff6eda9af2c std::_Locinfo::_Locinfo_ctor 81 API calls 74727->74728 74728->74726 74732 7ff6ed883e40 74729->74732 74733 7ff6ed883e54 74732->74733 74735 7ff6ed875053 74732->74735 74736 7ff6eda89f60 13 API calls 2 library calls 74733->74736 74735->74576 74736->74735 74737 7ff6eda6538c 74738 7ff6eda61918 std::_Lockit::_Lockit 6 API calls 74737->74738 74739 7ff6eda653b5 74738->74739 74740 7ff6eda65477 74739->74740 74743 7ff6eda653e6 74739->74743 74752 7ff6eda61d40 74740->74752 74741 7ff6eda61990 std::_Lockit::~_Lockit LeaveCriticalSection 74744 7ff6eda65461 74741->74744 74743->74741 74753 7ff6eda61d4e std::bad_alloc::bad_alloc 74752->74753 74756 7ff6eda84230 RtlPcToFileHeader RaiseException 74753->74756 74755 7ff6eda61d5f 74756->74755 74757 7ff6ed8f6390 74760 7ff6ed8cdce0 74757->74760 74759 7ff6ed8f63ad 74761 7ff6ed8cdd05 74760->74761 74762 7ff6ed8cdd0c allocator 74761->74762 74763 7ff6ed8cdd65 74761->74763 74778 7ff6ed8be030 51 API calls 2 library calls 74762->74778 74767 7ff6ed8cddeb allocator 74763->74767 74768 7ff6ed8cdd88 allocator 74763->74768 74765 7ff6ed8cdd30 74779 7ff6ed8a7360 74765->74779 74783 7ff6ed8be030 51 API calls 2 library calls 74767->74783 74774 7ff6ed8cbaf0 74768->74774 74770 7ff6ed8cde0f 74771 7ff6ed8a7360 51 API calls 74770->74771 74773 7ff6ed8cdd54 74771->74773 74773->74759 74775 7ff6ed8cbb08 allocator 74774->74775 74784 7ff6ed8c30f0 74775->74784 74778->74765 74780 7ff6ed8a7378 _Mpunct swap 74779->74780 74857 7ff6ed89ac70 74780->74857 74783->74770 74785 7ff6ed8c3142 allocator 74784->74785 74786 7ff6ed8c3129 allocator 74784->74786 74790 7ff6ed8c39b0 74785->74790 74807 7ff6ed8c2aa0 51 API calls 2 library calls 74786->74807 74789 7ff6ed8c3140 74789->74773 74791 7ff6ed8c39d3 Concurrency::details::WorkQueue::IsStructuredEmpty 74790->74791 74793 7ff6ed8c3a51 74791->74793 74811 7ff6ed89cb20 51 API calls _Mpunct 74791->74811 74808 7ff6ed893bd0 74793->74808 74795 7ff6ed8c3a85 allocator 74812 7ff6ed8cb490 51 API calls 2 library calls 74795->74812 74797 7ff6ed8c3af3 74798 7ff6ed8c3b3e 74797->74798 74799 7ff6ed8c3b1c 74797->74799 74814 7ff6ed8968a0 51 API calls allocator 74798->74814 74813 7ff6ed8968a0 51 API calls allocator 74799->74813 74802 7ff6ed8c3b3b 74816 7ff6ed89c5f0 51 API calls 2 library calls 74802->74816 74803 7ff6ed8c3b5d 74815 7ff6ed8968a0 51 API calls allocator 74803->74815 74806 7ff6ed8c3bb4 74806->74789 74807->74789 74817 7ff6ed89cb90 74808->74817 74811->74793 74812->74797 74813->74802 74814->74803 74815->74802 74816->74806 74822 7ff6ed8959f0 74817->74822 74823 7ff6ed895a1e 74822->74823 74824 7ff6ed895a23 74822->74824 74833 7ff6ed883d40 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 74823->74833 74826 7ff6ed86b860 74824->74826 74827 7ff6ed86b875 74826->74827 74832 7ff6ed86b871 74826->74832 74828 7ff6ed86b88c 74827->74828 74829 7ff6ed86b880 74827->74829 74842 7ff6ed880530 74828->74842 74834 7ff6ed86b9c0 74829->74834 74832->74795 74833->74824 74835 7ff6ed86b9e8 74834->74835 74836 7ff6ed86b9e3 74834->74836 74838 7ff6ed880530 allocator 4 API calls 74835->74838 74845 7ff6ed883d40 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 74836->74845 74839 7ff6ed86b9f3 74838->74839 74841 7ff6ed86ba14 74839->74841 74846 7ff6eda89434 47 API calls _invalid_parameter_noinfo_noreturn 74839->74846 74841->74832 74847 7ff6eda83130 74842->74847 74845->74835 74848 7ff6eda8313b 74847->74848 74849 7ff6ed880543 74848->74849 74850 7ff6edaa048c std::_Facet_Register 2 API calls 74848->74850 74851 7ff6eda8315a 74848->74851 74849->74832 74850->74848 74853 7ff6eda61d40 Concurrency::cancel_current_task 2 API calls 74851->74853 74855 7ff6eda83165 74851->74855 74853->74855 74854 7ff6eda8316b 74856 7ff6eda83df0 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 74855->74856 74856->74854 74858 7ff6ed89ac83 _Mpunct 74857->74858 74861 7ff6ed89dbc0 74858->74861 74862 7ff6ed89dbda 74861->74862 74863 7ff6ed89dbe9 74862->74863 74864 7ff6ed89dcdf 74862->74864 74919 7ff6ed8a2840 51 API calls 74863->74919 74898 7ff6ed89dcd9 allocator Concurrency::details::ContextBase::GetWorkQueueIdentity bool_ UnDecorator::getVbTableType shared_ptr 74864->74898 74921 7ff6ed8a2840 51 API calls 74864->74921 74866 7ff6ed89df56 74868 7ff6ed89df69 74866->74868 74869 7ff6ed89df8b allocator 74866->74869 74870 7ff6ed89df70 74868->74870 74871 7ff6ed89dfcb allocator 74868->74871 74904 7ff6ed897c90 74869->74904 74872 7ff6ed89e008 allocator 74870->74872 74877 7ff6ed89df7b allocator 74870->74877 74927 7ff6ed897cb0 51 API calls 74871->74927 74910 7ff6ed8709a0 74872->74910 74873 7ff6ed89df86 74916 7ff6ed89af30 74873->74916 74877->74873 74929 7ff6ed897c70 47 API calls 74877->74929 74878 7ff6ed89dfea 74928 7ff6ed89dac0 47 API calls shared_ptr 74878->74928 74879 7ff6ed89dc06 UnDecorator::getVbTableType 74920 7ff6ed898a60 51 API calls 2 library calls 74879->74920 74889 7ff6ed89e064 74891 7ff6ed89da60 47 API calls 74889->74891 74891->74873 74892 7ff6ed89dd0a allocator Concurrency::details::ContextBase::GetWorkQueueIdentity bool_ shared_ptr 74892->74898 74922 7ff6ed8a27c0 51 API calls allocator 74892->74922 74894 7ff6ed89ac70 51 API calls 74894->74898 74898->74866 74898->74894 74900 7ff6ed8a24d0 74898->74900 74923 7ff6ed898a60 51 API calls 2 library calls 74898->74923 74924 7ff6ed89d700 51 API calls 2 library calls 74898->74924 74925 7ff6ed8a27c0 51 API calls allocator 74898->74925 74926 7ff6ed89d4b0 51 API calls 2 library calls 74898->74926 74901 7ff6ed8a2512 Concurrency::details::WorkQueue::IsStructuredEmpty allocator 74900->74901 74930 7ff6ed897c50 74901->74930 74936 7ff6ed89bfa0 74904->74936 74906 7ff6ed897caa 74907 7ff6ed89da90 74906->74907 74961 7ff6ed86c5a0 74907->74961 74909 7ff6ed89dab6 74909->74873 74966 7ff6ed878ca0 74910->74966 74912 7ff6ed8709ba 74913 7ff6ed89da60 74912->74913 74914 7ff6ed86c5a0 shared_ptr 47 API calls 74913->74914 74915 7ff6ed89da86 74914->74915 74915->74873 74969 7ff6ed89ca10 74916->74969 74919->74879 74920->74898 74921->74892 74922->74892 74923->74898 74924->74898 74925->74898 74926->74898 74927->74878 74928->74873 74929->74889 74933 7ff6ed89bf20 74930->74933 74932 7ff6ed897c6a 74932->74898 74934 7ff6ed89ac70 51 API calls 74933->74934 74935 7ff6ed89bf37 std::_Throw_Cpp_error 74934->74935 74935->74932 74939 7ff6ed89acd0 74936->74939 74938 7ff6ed89bfb7 std::_Throw_Cpp_error 74938->74906 74942 7ff6ed89aa80 74939->74942 74943 7ff6ed89aa93 Concurrency::details::WorkQueue::IsStructuredEmpty 74942->74943 74946 7ff6ed8956a0 74943->74946 74947 7ff6ed8956b8 _Mpunct 74946->74947 74952 7ff6ed8956f0 74947->74952 74956 7ff6ed895703 shared_ptr 74952->74956 74953 7ff6ed8956d3 74957 7ff6ed8958f0 74953->74957 74954 7ff6ed8956f0 51 API calls 74954->74956 74955 7ff6ed895950 51 API calls 74955->74956 74956->74953 74956->74954 74956->74955 74958 7ff6ed89590b _Mpunct 74957->74958 74959 7ff6ed886390 type_info::_name_internal_method 47 API calls 74958->74959 74960 7ff6ed8956e5 74959->74960 74960->74938 74962 7ff6ed86c5c8 std::_Throw_Cpp_error 74961->74962 74963 7ff6ed86c5b9 74961->74963 74962->74909 74965 7ff6ed880330 47 API calls _invalid_parameter_noinfo_noreturn 74963->74965 74965->74962 74967 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 74966->74967 74968 7ff6ed878cb7 std::_Throw_Cpp_error 74967->74968 74968->74912 74970 7ff6ed89ca23 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 74969->74970 74974 7ff6ed89aca3 74970->74974 74975 7ff6ed894840 51 API calls allocator 74970->74975 74972 7ff6ed89ca88 74973 7ff6ed89da90 47 API calls 74972->74973 74973->74974 74974->74773 74975->74972 74976 7ff6ed8cf630 74979 7ff6ed8d9440 CoUninitialize 74976->74979 74978 7ff6ed8cf643 74979->74978 74980 7ff6eda9bb34 74981 7ff6eda9d690 74980->74981 74993 7ff6eda90bf4 74981->74993 74984 7ff6eda9dceb 74985 7ff6eda9dd24 75008 7ff6eda89464 IsProcessorFeaturePresent 74985->75008 74990 7ff6edaa0a88 47 API calls __std_exception_copy 74991 7ff6eda9d6b7 memcpy_s 74990->74991 74991->74984 74991->74985 74991->74990 74992 7ff6eda9aa6c 47 API calls _Getctype 74991->74992 75001 7ff6edaa12a0 74991->75001 74992->74991 74994 7ff6eda90c18 74993->74994 75000 7ff6eda90c13 74993->75000 74995 7ff6edaa0e8c __std_fs_code_page 47 API calls 74994->74995 74994->75000 74996 7ff6eda90c33 74995->74996 74997 7ff6edaa1300 __std_fs_code_page 47 API calls 74996->74997 74998 7ff6eda90c56 74997->74998 75012 7ff6edaa136c 47 API calls TranslateName 74998->75012 75000->74991 75002 7ff6edaa12eb 75001->75002 75006 7ff6edaa12af __std_fs_code_page 75001->75006 75013 7ff6eda89580 11 API calls memcpy_s 75002->75013 75003 7ff6edaa12d2 HeapAlloc 75005 7ff6edaa12e9 75003->75005 75003->75006 75005->74991 75006->75002 75006->75003 75007 7ff6edaa048c std::_Facet_Register 2 API calls 75006->75007 75007->75006 75009 7ff6eda89477 75008->75009 75014 7ff6eda89148 14 API calls 3 library calls 75009->75014 75011 7ff6eda89492 GetCurrentProcess TerminateProcess 75012->75000 75013->75005 75014->75011 75015 7ff6ed872b70 75016 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75015->75016 75017 7ff6ed872bb8 75016->75017 75018 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75017->75018 75019 7ff6ed872be2 75018->75019 75020 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75019->75020 75021 7ff6ed872c0c 75020->75021 75022 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75021->75022 75023 7ff6ed872c48 75022->75023 75024 7ff6ed8725a0 _Mpunct 51 API calls 75023->75024 75025 7ff6ed872de2 75024->75025 75026 7ff6ed871940 59 API calls 75025->75026 75027 7ff6ed872e10 75026->75027 75152 7ff6eda1e8b0 75027->75152 75029 7ff6ed872e3c 75160 7ff6ed8a31d0 75029->75160 75031 7ff6ed872e6a 75166 7ff6ed90fdf0 75031->75166 75035 7ff6ed872e97 75176 7ff6eda355f0 75035->75176 75037 7ff6ed872eea 75038 7ff6ed8725a0 _Mpunct 51 API calls 75037->75038 75039 7ff6ed873023 75038->75039 75040 7ff6ed8ba140 71 API calls 75039->75040 75041 7ff6ed873040 allocator 75040->75041 75042 7ff6ed8725a0 _Mpunct 51 API calls 75041->75042 75043 7ff6ed873075 UnDecorator::getVbTableType 75042->75043 75044 7ff6ed8724b0 51 API calls 75043->75044 75045 7ff6ed8730a9 allocator 75044->75045 75046 7ff6ed8730db CreateEventW 75045->75046 75047 7ff6ed873107 UnDecorator::getVbTableType 75046->75047 75179 7ff6ed87b040 GetDesktopWindow EnumChildWindows 75047->75179 75049 7ff6ed873115 75050 7ff6eda83130 std::_Facet_Register 4 API calls 75049->75050 75051 7ff6ed873120 75050->75051 75052 7ff6ed87313f 75051->75052 75310 7ff6ed90c8e0 74 API calls 4 library calls 75051->75310 75054 7ff6eda83130 std::_Facet_Register 4 API calls 75052->75054 75055 7ff6ed87317a 75054->75055 75056 7ff6ed873193 75055->75056 75311 7ff6ed914920 49 API calls 75055->75311 75180 7ff6ed90e830 75056->75180 75060 7ff6eda83130 std::_Facet_Register 4 API calls 75061 7ff6ed8731e3 75060->75061 75062 7ff6ed873202 75061->75062 75187 7ff6ed910b50 75061->75187 75190 7ff6eda346a0 75062->75190 75067 7ff6ed873251 75213 7ff6ed877050 75067->75213 75153 7ff6eda1e8e5 75152->75153 75154 7ff6eda1e91b CoInitializeEx 75153->75154 75155 7ff6eda1e933 75154->75155 75159 7ff6eda1e931 75154->75159 75327 7ff6ed8da410 CoCreateInstance 75155->75327 75157 7ff6eda1e95b 75157->75159 75328 7ff6eda1eca0 75157->75328 75159->75029 75161 7ff6ed8a3203 75160->75161 75162 7ff6ed871880 67 API calls 75161->75162 75163 7ff6ed8a3215 75162->75163 75418 7ff6ed8a3470 75163->75418 75165 7ff6ed8a3227 UnDecorator::getVbTableType 75165->75031 75427 7ff6eda4b7a0 75166->75427 75168 7ff6ed90fe06 75432 7ff6ed90fcb0 75168->75432 75171 7ff6ed919ec0 75460 7ff6ed8a6930 75171->75460 75174 7ff6ed8a6930 49 API calls 75175 7ff6ed919ee8 75174->75175 75175->75035 75177 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75176->75177 75178 7ff6eda3561c 75177->75178 75178->75037 75179->75049 75484 7ff6ed90b550 75180->75484 75184 7ff6ed90e87e 75492 7ff6ed876440 75184->75492 75538 7ff6ed912020 75187->75538 75191 7ff6eda346ae 75190->75191 75192 7ff6ed873244 75190->75192 75193 7ff6eda83130 std::_Facet_Register 4 API calls 75191->75193 75196 7ff6ed885f80 75192->75196 75194 7ff6eda346b8 75193->75194 75194->75192 75551 7ff6eda33a30 50 API calls 75194->75551 75197 7ff6eda346a0 50 API calls 75196->75197 75198 7ff6ed885f91 Concurrency::details::_Scheduler::_Scheduler 75197->75198 75199 7ff6ed871880 67 API calls 75198->75199 75200 7ff6ed885fef 75199->75200 75552 7ff6eda34780 75200->75552 75202 7ff6ed886019 Concurrency::details::_Scheduler::_Scheduler UnDecorator::getVbTableType 75203 7ff6ed871880 67 API calls 75202->75203 75204 7ff6ed886087 75203->75204 75205 7ff6eda34780 55 API calls 75204->75205 75206 7ff6ed8860b7 UnDecorator::getVbTableType 75205->75206 75573 7ff6eda34ae0 75206->75573 75208 7ff6ed8860d2 Concurrency::details::_Scheduler::_Scheduler 75209 7ff6ed871880 67 API calls 75208->75209 75210 7ff6ed886141 75209->75210 75211 7ff6eda34780 55 API calls 75210->75211 75212 7ff6ed886171 UnDecorator::getVbTableType 75211->75212 75212->75067 75310->75052 75311->75056 75327->75157 75329 7ff6ed8725a0 _Mpunct 51 API calls 75328->75329 75330 7ff6eda1ecdd 75329->75330 75331 7ff6ed8ba140 71 API calls 75330->75331 75332 7ff6eda1ecf7 75331->75332 75333 7ff6ed8725a0 _Mpunct 51 API calls 75332->75333 75334 7ff6eda1ed1c 75333->75334 75335 7ff6ed8ba140 71 API calls 75334->75335 75337 7ff6eda1ed36 allocator Concurrency::details::HardwareAffinity::operator!= 75335->75337 75336 7ff6eda1ee29 UnDecorator::getVbTableType 75336->75159 75337->75336 75370 7ff6eda19ae0 75337->75370 75339 7ff6eda1f00a allocator 75340 7ff6eda19ae0 3 API calls 75339->75340 75345 7ff6eda1f070 allocator 75340->75345 75341 7ff6eda1f43d 75389 7ff6ed8d7b30 SysFreeString 75341->75389 75343 7ff6eda1f447 75390 7ff6ed8d7b30 SysFreeString 75343->75390 75345->75341 75346 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75345->75346 75347 7ff6eda1f136 75346->75347 75348 7ff6ed8b9730 71 API calls 75347->75348 75349 7ff6eda1f153 allocator 75348->75349 75350 7ff6eda1f190 SysStringLen 75349->75350 75351 7ff6eda1f1aa allocator 75350->75351 75378 7ff6ed8a6370 75351->75378 75356 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 75357 7ff6eda1f244 75356->75357 75358 7ff6ed8b9730 71 API calls 75357->75358 75359 7ff6eda1f261 allocator 75358->75359 75362 7ff6eda1f29e SysStringLen 75359->75362 75360 7ff6eda1f315 UnDecorator::getVbTableType 75360->75341 75361 7ff6eda1f3bc 75360->75361 75387 7ff6ed8d7b30 SysFreeString 75361->75387 75363 7ff6eda1f2b8 allocator 75362->75363 75365 7ff6ed8a6370 59 API calls 75363->75365 75367 7ff6eda1f2dd 75365->75367 75366 7ff6eda1f3e3 75388 7ff6ed8d7b30 SysFreeString 75366->75388 75369 7ff6ed9073e0 allocator 2 API calls 75367->75369 75369->75360 75371 7ff6eda19afe 75370->75371 75372 7ff6eda19af4 75370->75372 75373 7ff6eda19b14 SysAllocStringLen 75371->75373 75377 7ff6eda19b06 75371->75377 75391 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75372->75391 75375 7ff6eda19b32 List 75373->75375 75375->75377 75392 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75375->75392 75377->75339 75379 7ff6ed87be40 57 API calls 75378->75379 75380 7ff6ed8a6388 75379->75380 75393 7ff6ed8a6210 75380->75393 75383 7ff6ed9073e0 75384 7ff6ed9073f8 allocator 75383->75384 75413 7ff6ed879e00 75384->75413 75386 7ff6ed907405 75386->75356 75386->75360 75387->75366 75388->75336 75389->75343 75390->75336 75391->75371 75392->75377 75394 7ff6ed8a6228 75393->75394 75394->75394 75395 7ff6ed8a6268 75394->75395 75409 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75394->75409 75397 7ff6ed8a6281 75395->75397 75410 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75395->75410 75399 7ff6ed8a62b7 UnDecorator::getVbTableType 75397->75399 75411 7ff6ed880310 RtlPcToFileHeader RaiseException strrchr 75397->75411 75405 7ff6ed87d970 75399->75405 75402 7ff6ed8a62d5 75403 7ff6ed8927c0 UnDecorator::getVbTableType 47 API calls 75402->75403 75404 7ff6ed8a62fd 75403->75404 75404->75383 75406 7ff6ed87d984 strrchr 75405->75406 75408 7ff6ed87d9a1 strrchr 75406->75408 75412 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75406->75412 75408->75402 75409->75394 75410->75397 75411->75399 75412->75408 75414 7ff6ed879e0e allocator 75413->75414 75416 7ff6ed879e59 allocator type_info::_name_internal_method 75414->75416 75417 7ff6ed879c10 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task atomic 75414->75417 75416->75386 75417->75414 75419 7ff6ed8a3488 75418->75419 75424 7ff6ed8a34ba 75418->75424 75420 7ff6eda83130 std::_Facet_Register 4 API calls 75419->75420 75421 7ff6ed8a3492 75420->75421 75422 7ff6ed8a349f 75421->75422 75421->75424 75426 7ff6ed921210 76 API calls 5 library calls 75422->75426 75424->75165 75425 7ff6ed8a34b3 75425->75424 75426->75425 75436 7ff6eda3c730 75427->75436 75429 7ff6eda4b7de memcpy_s 75430 7ff6eda4b842 WlanAllocateMemory 75429->75430 75431 7ff6eda4b86b memcpy_s 75430->75431 75431->75168 75433 7ff6ed90fcc6 75432->75433 75434 7ff6ed90fd0b CoInitializeEx CoInitializeSecurity CoCreateInstance IcmpCreateFile 75433->75434 75435 7ff6ed872e80 75434->75435 75435->75171 75439 7ff6eda3c380 75436->75439 75440 7ff6eda3c3b1 75439->75440 75443 7ff6eda3e1e0 75440->75443 75442 7ff6eda3c3bc 75442->75429 75444 7ff6eda3e1f3 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 75443->75444 75447 7ff6eda36a90 75444->75447 75446 7ff6eda3e22a _Mpunct 75446->75442 75450 7ff6eda3f850 75447->75450 75449 7ff6eda36aa8 _Mpunct 75449->75446 75455 7ff6eda389b0 75450->75455 75453 7ff6ed86b860 allocator 49 API calls 75454 7ff6eda3f870 75453->75454 75454->75449 75456 7ff6eda389de 75455->75456 75457 7ff6eda389e3 75455->75457 75459 7ff6ed883d40 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 75456->75459 75457->75453 75459->75457 75463 7ff6ed871d80 75460->75463 75464 7ff6ed871db1 75463->75464 75467 7ff6ed880440 75464->75467 75466 7ff6ed871dbc 75466->75174 75468 7ff6ed880453 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 75467->75468 75471 7ff6ed86baf0 75468->75471 75470 7ff6ed88048a _Mpunct 75470->75466 75474 7ff6ed8844f0 75471->75474 75473 7ff6ed86bb08 _Mpunct 75473->75470 75479 7ff6ed86e300 75474->75479 75477 7ff6ed86b860 allocator 49 API calls 75478 7ff6ed884510 75477->75478 75478->75473 75480 7ff6ed86e333 75479->75480 75481 7ff6ed86e32e 75479->75481 75480->75477 75483 7ff6ed883d40 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 75481->75483 75483->75480 75485 7ff6ed90b56d allocator 75484->75485 75496 7ff6ed90bd60 75485->75496 75487 7ff6ed90b595 75488 7ff6ed90d5b0 75487->75488 75489 7ff6ed90d5ca 75488->75489 75490 7ff6ed90d5d6 75489->75490 75536 7ff6eda901b0 47 API calls 2 library calls 75489->75536 75490->75184 75493 7ff6ed876453 75492->75493 75494 7ff6ed8731d8 75493->75494 75537 7ff6eda901b0 47 API calls 2 library calls 75493->75537 75494->75060 75497 7ff6ed90bd80 allocator 75496->75497 75504 7ff6ed870fd0 75497->75504 75499 7ff6ed90bda8 allocator 75507 7ff6eda900c8 75499->75507 75503 7ff6ed90be03 type_info::_name_internal_method 75503->75487 75505 7ff6eda83130 std::_Facet_Register 4 API calls 75504->75505 75506 7ff6ed870ff5 allocator type_info::_name_internal_method 75505->75506 75506->75499 75508 7ff6eda900ff 75507->75508 75509 7ff6eda900e8 75507->75509 75526 7ff6eda8ff9c 75508->75526 75533 7ff6eda89580 11 API calls memcpy_s 75509->75533 75513 7ff6eda900ed 75534 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 75513->75534 75514 7ff6eda90112 CreateThread 75516 7ff6eda90142 GetLastError 75514->75516 75517 7ff6ed90bdf0 75514->75517 75535 7ff6eda894f4 11 API calls 2 library calls 75516->75535 75517->75503 75525 7ff6eda62198 51 API calls 3 library calls 75517->75525 75519 7ff6eda9014f 75520 7ff6eda9015e 75519->75520 75521 7ff6eda90158 CloseHandle 75519->75521 75522 7ff6eda90167 FreeLibrary 75520->75522 75523 7ff6eda9016d 75520->75523 75521->75520 75522->75523 75524 7ff6edaa1264 __free_lconv_mon 11 API calls 75523->75524 75524->75517 75525->75503 75527 7ff6edaa11ec __std_fs_code_page 11 API calls 75526->75527 75528 7ff6eda8ffbe 75527->75528 75529 7ff6edaa1264 __free_lconv_mon 11 API calls 75528->75529 75530 7ff6eda8ffc8 75529->75530 75531 7ff6eda8ffd1 GetModuleHandleExW 75530->75531 75532 7ff6eda8ffcd 75530->75532 75531->75532 75532->75514 75532->75517 75533->75513 75534->75517 75535->75519 75545 7ff6ed912090 6 API calls 75538->75545 75540 7ff6ed912038 75541 7ff6ed912090 9 API calls 75540->75541 75542 7ff6ed912050 75541->75542 75543 7ff6ed912090 9 API calls 75542->75543 75544 7ff6ed910c51 75543->75544 75544->75062 75549 7ff6edab3f60 75545->75549 75548 7ff6ed912170 75548->75540 75550 7ff6ed912138 GlobalUnlock CreateStreamOnHGlobal GetLastError 75549->75550 75550->75548 75551->75192 75553 7ff6eda347bf 75552->75553 75554 7ff6eda34949 75553->75554 75555 7ff6eda347f7 75553->75555 75572 7ff6eda34ac1 75553->75572 75557 7ff6eda83130 std::_Facet_Register 4 API calls 75554->75557 75556 7ff6eda83130 std::_Facet_Register 4 API calls 75555->75556 75559 7ff6eda34817 75556->75559 75560 7ff6eda34969 75557->75560 75558 7ff6eda349e9 75583 7ff6ed8f2750 51 API calls allocator 75558->75583 75564 7ff6eda34885 75559->75564 75579 7ff6eda339b0 49 API calls Concurrency::details::SchedulerBase::GetPolicy 75559->75579 75560->75558 75582 7ff6eda339b0 49 API calls Concurrency::details::SchedulerBase::GetPolicy 75560->75582 75580 7ff6eda351e0 51 API calls allocator 75564->75580 75565 7ff6eda34a2b allocator 75566 7ff6eda34a39 AppendMenuW 75565->75566 75568 7ff6eda34943 75566->75568 75584 7ff6eda33850 51 API calls Concurrency::details::WorkQueue::IsStructuredEmpty 75568->75584 75569 7ff6eda34935 75581 7ff6eda34b80 3 API calls 6 library calls 75569->75581 75572->75202 75574 7ff6eda34b06 75573->75574 75575 7ff6ed871880 67 API calls 75574->75575 75576 7ff6eda34b30 75575->75576 75577 7ff6eda34780 55 API calls 75576->75577 75578 7ff6eda34b62 UnDecorator::getVbTableType 75577->75578 75578->75208 75579->75564 75580->75569 75581->75568 75582->75558 75583->75565 75584->75572 76219 7ff6ed87b070 76220 7ff6ed8725a0 _Mpunct 51 API calls 76219->76220 76221 7ff6ed87b0ae 76220->76221 76222 7ff6ed8ba140 71 API calls 76221->76222 76223 7ff6ed87b0c5 allocator 76222->76223 76224 7ff6ed8725a0 _Mpunct 51 API calls 76223->76224 76225 7ff6ed87b0fa UnDecorator::getVbTableType 76224->76225 76226 7ff6ed8725a0 _Mpunct 51 API calls 76225->76226 76227 7ff6ed87b12d 76226->76227 76228 7ff6ed8ba140 71 API calls 76227->76228 76229 7ff6ed87b14a allocator 76228->76229 76230 7ff6ed8725a0 _Mpunct 51 API calls 76229->76230 76231 7ff6ed87b17c UnDecorator::getVbTableType 76230->76231 76232 7ff6ed8725a0 _Mpunct 51 API calls 76231->76232 76233 7ff6ed87b1af 76232->76233 76234 7ff6ed8ba140 71 API calls 76233->76234 76235 7ff6ed87b1cc allocator 76234->76235 76236 7ff6ed8725a0 _Mpunct 51 API calls 76235->76236 76237 7ff6ed87b201 UnDecorator::getVbTableType 76236->76237 76238 7ff6ed8725a0 _Mpunct 51 API calls 76237->76238 76239 7ff6ed87b234 76238->76239 76240 7ff6ed8ba140 71 API calls 76239->76240 76241 7ff6ed87b251 allocator 76240->76241 76242 7ff6ed8725a0 _Mpunct 51 API calls 76241->76242 76243 7ff6ed87b286 UnDecorator::getVbTableType 76242->76243 76244 7ff6ed8725a0 _Mpunct 51 API calls 76243->76244 76245 7ff6ed87b2b9 76244->76245 76246 7ff6ed8ba140 71 API calls 76245->76246 76247 7ff6ed87b2d6 allocator 76246->76247 76248 7ff6ed8725a0 _Mpunct 51 API calls 76247->76248 76249 7ff6ed87b30b UnDecorator::getVbTableType 76248->76249 76250 7ff6ed87b319 GetClassNameW 76249->76250 76251 7ff6ed87b3f9 76250->76251 76252 7ff6ed87b387 GetWindowTextW 76250->76252 76253 7ff6ed8724b0 51 API calls 76251->76253 76252->76251 76254 7ff6ed87b3a6 76252->76254 76264 7ff6ed87b41e allocator ProcessCodePage UnDecorator::getVbTableType 76253->76264 76255 7ff6ed875200 shared_ptr 47 API calls 76254->76255 76256 7ff6ed87b3bb 76255->76256 76257 7ff6ed875200 shared_ptr 47 API calls 76256->76257 76258 7ff6ed87b3c9 76257->76258 76259 7ff6ed875200 shared_ptr 47 API calls 76258->76259 76260 7ff6ed87b3d7 76259->76260 76261 7ff6ed875200 shared_ptr 47 API calls 76260->76261 76262 7ff6ed87b3e2 76261->76262 76263 7ff6ed875200 shared_ptr 47 API calls 76262->76263 76265 7ff6ed87b3f0 76263->76265 76266 7ff6ed87b54d 76264->76266 76267 7ff6ed87b499 EnumChildWindows EnumChildWindows EnumChildWindows 76264->76267 76269 7ff6ed8724b0 51 API calls 76266->76269 76278 7ff6ed87b57e allocator ProcessCodePage UnDecorator::getVbTableType 76266->76278 76268 7ff6ed875200 shared_ptr 47 API calls 76267->76268 76270 7ff6ed87b50f 76268->76270 76269->76278 76271 7ff6ed875200 shared_ptr 47 API calls 76270->76271 76272 7ff6ed87b51d 76271->76272 76273 7ff6ed875200 shared_ptr 47 API calls 76272->76273 76279 7ff6ed87b52b 76273->76279 76274 7ff6ed87b624 allocator ProcessCodePage UnDecorator::getVbTableType 76276 7ff6ed87b737 76274->76276 76277 7ff6ed87b6d5 76274->76277 76275 7ff6ed8724b0 51 API calls 76275->76274 76282 7ff6ed8724b0 51 API calls 76276->76282 76293 7ff6ed87b76b allocator ProcessCodePage UnDecorator::getVbTableType 76276->76293 76280 7ff6ed875200 shared_ptr 47 API calls 76277->76280 76278->76274 76278->76275 76281 7ff6ed875200 shared_ptr 47 API calls 76279->76281 76283 7ff6ed87b6f9 76280->76283 76284 7ff6ed87b536 76281->76284 76282->76293 76285 7ff6ed875200 shared_ptr 47 API calls 76283->76285 76286 7ff6ed875200 shared_ptr 47 API calls 76284->76286 76287 7ff6ed87b707 76285->76287 76286->76265 76291 7ff6ed875200 shared_ptr 47 API calls 76287->76291 76288 7ff6ed87b860 76295 7ff6ed8724b0 51 API calls 76288->76295 76306 7ff6ed87b894 allocator ProcessCodePage UnDecorator::getVbTableType 76288->76306 76289 7ff6ed87b7fe 76290 7ff6ed875200 shared_ptr 47 API calls 76289->76290 76292 7ff6ed87b822 76290->76292 76294 7ff6ed87b715 76291->76294 76296 7ff6ed875200 shared_ptr 47 API calls 76292->76296 76293->76288 76293->76289 76297 7ff6ed875200 shared_ptr 47 API calls 76294->76297 76295->76306 76298 7ff6ed87b830 76296->76298 76301 7ff6ed87b720 76297->76301 76302 7ff6ed875200 shared_ptr 47 API calls 76298->76302 76299 7ff6ed87b927 76304 7ff6ed875200 shared_ptr 47 API calls 76299->76304 76300 7ff6ed87b986 76303 7ff6ed875200 shared_ptr 47 API calls 76300->76303 76305 7ff6ed875200 shared_ptr 47 API calls 76301->76305 76307 7ff6ed87b83e 76302->76307 76308 7ff6ed87b99b 76303->76308 76309 7ff6ed87b94b 76304->76309 76305->76265 76306->76299 76306->76300 76310 7ff6ed875200 shared_ptr 47 API calls 76307->76310 76311 7ff6ed875200 shared_ptr 47 API calls 76308->76311 76312 7ff6ed875200 shared_ptr 47 API calls 76309->76312 76313 7ff6ed87b849 76310->76313 76314 7ff6ed87b9a9 76311->76314 76315 7ff6ed87b959 76312->76315 76317 7ff6ed875200 shared_ptr 47 API calls 76313->76317 76318 7ff6ed875200 shared_ptr 47 API calls 76314->76318 76316 7ff6ed875200 shared_ptr 47 API calls 76315->76316 76319 7ff6ed87b967 76316->76319 76317->76265 76320 7ff6ed87b9b7 76318->76320 76321 7ff6ed875200 shared_ptr 47 API calls 76319->76321 76322 7ff6ed875200 shared_ptr 47 API calls 76320->76322 76323 7ff6ed87b972 76321->76323 76324 7ff6ed87b9c2 76322->76324 76325 7ff6ed875200 shared_ptr 47 API calls 76323->76325 76326 7ff6ed875200 shared_ptr 47 API calls 76324->76326 76325->76265 76326->76265 76327 7ff6ed87db30 76328 7ff6ed87db48 ctype 76327->76328 76653 7ff6ed88bc90 76328->76653 76330 7ff6ed87db58 76730 7ff6ed88ef80 76330->76730 76333 7ff6ed8725a0 _Mpunct 51 API calls 76334 7ff6ed87db8f 76333->76334 76335 7ff6ed8ba140 71 API calls 76334->76335 76336 7ff6ed87dba9 76335->76336 76337 7ff6ed8725a0 _Mpunct 51 API calls 76336->76337 76338 7ff6ed87dbce 76337->76338 76339 7ff6ed8ba140 71 API calls 76338->76339 76340 7ff6ed87dbe8 76339->76340 76341 7ff6ed8725a0 _Mpunct 51 API calls 76340->76341 76342 7ff6ed87dc0d 76341->76342 76343 7ff6ed8ba140 71 API calls 76342->76343 76344 7ff6ed87dc27 76343->76344 76345 7ff6ed8725a0 _Mpunct 51 API calls 76344->76345 76346 7ff6ed87dc4c 76345->76346 76347 7ff6ed8ba140 71 API calls 76346->76347 76348 7ff6ed87dc66 76347->76348 76349 7ff6ed8725a0 _Mpunct 51 API calls 76348->76349 76350 7ff6ed87dc8b 76349->76350 76351 7ff6ed8ba140 71 API calls 76350->76351 76352 7ff6ed87dca5 76351->76352 76353 7ff6ed8725a0 _Mpunct 51 API calls 76352->76353 76354 7ff6ed87dcca 76353->76354 76355 7ff6ed8ba140 71 API calls 76354->76355 76356 7ff6ed87dce7 allocator 76355->76356 76357 7ff6ed8725a0 _Mpunct 51 API calls 76356->76357 76358 7ff6ed87dd1c UnDecorator::getVbTableType 76357->76358 76359 7ff6ed8725a0 _Mpunct 51 API calls 76358->76359 76360 7ff6ed87dd4f 76359->76360 76361 7ff6ed8ba140 71 API calls 76360->76361 76362 7ff6ed87dd69 76361->76362 76363 7ff6ed871940 59 API calls 76362->76363 76364 7ff6ed87dd74 76363->76364 76754 7ff6ed8daee0 76364->76754 76366 7ff6ed87dd82 allocator 76367 7ff6ed87baf0 69 API calls 76366->76367 76368 7ff6ed87ddec UnDecorator::getVbTableType 76367->76368 76369 7ff6ed871880 67 API calls 76368->76369 76370 7ff6ed87de0f 76369->76370 76371 7ff6ed871880 67 API calls 76370->76371 76372 7ff6ed87de24 76371->76372 76373 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76372->76373 76374 7ff6ed87de47 76373->76374 76375 7ff6ed8b9730 71 API calls 76374->76375 76376 7ff6ed87de64 76375->76376 76377 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76376->76377 76378 7ff6ed87deae 76377->76378 76379 7ff6ed8b9730 71 API calls 76378->76379 76380 7ff6ed87decb 76379->76380 76381 7ff6ed8fd260 76 API calls 76380->76381 76382 7ff6ed87df22 UnDecorator::getVbTableType 76381->76382 76770 7ff6ed8692c0 76382->76770 76654 7ff6ed887e30 74 API calls 76653->76654 76655 7ff6ed88bca9 76654->76655 76656 7ff6ed8725a0 _Mpunct 51 API calls 76655->76656 76729 7ff6ed88c272 UnDecorator::getVbTableType 76655->76729 76657 7ff6ed88bcdc 76656->76657 76658 7ff6ed8ba140 71 API calls 76657->76658 76659 7ff6ed88bcf6 76658->76659 76660 7ff6ed8725a0 _Mpunct 51 API calls 76659->76660 76661 7ff6ed88bd1b 76660->76661 76662 7ff6ed8ba140 71 API calls 76661->76662 76663 7ff6ed88bd35 76662->76663 76664 7ff6ed871940 59 API calls 76663->76664 76665 7ff6ed88bd40 76664->76665 76666 7ff6ed871940 59 API calls 76665->76666 76667 7ff6ed88bd4b 76666->76667 76668 7ff6ed88bd6b 76667->76668 76669 7ff6ed88bd5b 76667->76669 76672 7ff6ed8725a0 _Mpunct 51 API calls 76668->76672 76670 7ff6ed88bd66 76669->76670 76671 7ff6ed88bdea 76669->76671 76676 7ff6ed871940 59 API calls 76670->76676 76673 7ff6ed8725a0 _Mpunct 51 API calls 76671->76673 76674 7ff6ed88bd8f 76672->76674 76675 7ff6ed88be0e 76673->76675 76677 7ff6ed8ba140 71 API calls 76674->76677 76678 7ff6ed8ba140 71 API calls 76675->76678 76679 7ff6ed88be73 76676->76679 76680 7ff6ed88bdac 76677->76680 76681 7ff6ed88be2b 76678->76681 76682 7ff6ed8725a0 _Mpunct 51 API calls 76679->76682 76683 7ff6ed876580 UnDecorator::getVbTableType 50 API calls 76680->76683 76684 7ff6ed876580 UnDecorator::getVbTableType 50 API calls 76681->76684 76685 7ff6ed88be98 76682->76685 76689 7ff6ed88bdd6 UnDecorator::getVbTableType 76683->76689 76684->76689 76686 7ff6ed8ba140 71 API calls 76685->76686 76687 7ff6ed88beb5 76686->76687 76688 7ff6ed876580 UnDecorator::getVbTableType 50 API calls 76687->76688 76690 7ff6ed88bedf UnDecorator::getVbTableType 76688->76690 76691 7ff6ed8725a0 _Mpunct 51 API calls 76689->76691 76694 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76690->76694 76692 7ff6ed88c02f 76691->76692 76693 7ff6ed8ba140 71 API calls 76692->76693 76695 7ff6ed88c049 76693->76695 76696 7ff6ed88bf10 76694->76696 76697 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76695->76697 76698 7ff6ed8b9730 71 API calls 76696->76698 76699 7ff6ed88c06c 76697->76699 76700 7ff6ed88bf2d allocator 76698->76700 76701 7ff6ed8b9730 71 API calls 76699->76701 76704 7ff6ed87baf0 69 API calls 76700->76704 76702 7ff6ed88c089 76701->76702 76703 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76702->76703 76705 7ff6ed88c0d6 76703->76705 76708 7ff6ed88bf64 allocator UnDecorator::getVbTableType 76704->76708 76706 7ff6ed8b9730 71 API calls 76705->76706 76707 7ff6ed88c0f3 allocator 76706->76707 76709 7ff6ed87baf0 69 API calls 76707->76709 76710 7ff6ed8725a0 _Mpunct 51 API calls 76708->76710 76714 7ff6ed88c13a UnDecorator::getVbTableType 76709->76714 76711 7ff6ed88bf9d 76710->76711 76712 7ff6ed8ba140 71 API calls 76711->76712 76713 7ff6ed88bfba 76712->76713 76715 7ff6ed876580 UnDecorator::getVbTableType 50 API calls 76713->76715 76716 7ff6ed871880 67 API calls 76714->76716 76715->76689 76717 7ff6ed88c168 76716->76717 76718 7ff6ed871880 67 API calls 76717->76718 76719 7ff6ed88c17a 76718->76719 76720 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76719->76720 76721 7ff6ed88c19d 76720->76721 76722 7ff6ed8b9730 71 API calls 76721->76722 76723 7ff6ed88c1ba 76722->76723 76724 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76723->76724 76725 7ff6ed88c204 76724->76725 76726 7ff6ed8b9730 71 API calls 76725->76726 76727 7ff6ed88c221 76726->76727 76728 7ff6ed8fd260 76 API calls 76727->76728 76728->76729 76729->76330 76731 7ff6ed8725a0 _Mpunct 51 API calls 76730->76731 76732 7ff6ed88efae 76731->76732 76733 7ff6ed8ba140 71 API calls 76732->76733 76734 7ff6ed88efc2 allocator 76733->76734 76735 7ff6ed8725a0 _Mpunct 51 API calls 76734->76735 76736 7ff6ed88efeb UnDecorator::getVbTableType 76735->76736 76737 7ff6ed8725a0 _Mpunct 51 API calls 76736->76737 76738 7ff6ed88f015 76737->76738 76739 7ff6ed8ba140 71 API calls 76738->76739 76740 7ff6ed88f032 allocator 76739->76740 76741 7ff6ed8725a0 _Mpunct 51 API calls 76740->76741 76742 7ff6ed88f067 UnDecorator::getVbTableType 76741->76742 76743 7ff6ed88f075 GetModuleFileNameW 76742->76743 76744 7ff6ed8724b0 51 API calls 76743->76744 76745 7ff6ed88f0b2 allocator 76744->76745 76746 7ff6ed88f0e4 RegOpenKeyExW 76745->76746 76747 7ff6ed88f118 UnDecorator::getVbTableType 76746->76747 76748 7ff6ed88f120 RegSetValueExW RegCloseKey 76747->76748 76749 7ff6ed88f185 76747->76749 76748->76749 76750 7ff6ed875200 shared_ptr 47 API calls 76749->76750 76751 7ff6ed88f192 76750->76751 76752 7ff6ed875200 shared_ptr 47 API calls 76751->76752 76753 7ff6ed87db6a 76752->76753 76753->76333 76755 7ff6ed871940 59 API calls 76754->76755 76756 7ff6ed8daefe 76755->76756 77572 7ff6ed87bdd0 76756->77572 76759 7ff6ed8daf3b 76762 7ff6ed8725a0 _Mpunct 51 API calls 76759->76762 76760 7ff6ed8dafc6 76761 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76760->76761 76769 7ff6ed8daf9b UnDecorator::getVbTableType 76761->76769 76763 7ff6ed8daf56 76762->76763 76764 7ff6ed8ba140 71 API calls 76763->76764 76765 7ff6ed8daf6a 76764->76765 76766 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76765->76766 76767 7ff6ed8daf84 76766->76767 76768 7ff6ed8b9730 71 API calls 76767->76768 76768->76769 76769->76366 76771 7ff6ed8692dd allocator 76770->76771 77590 7ff6ed86feb0 76771->77590 76773 7ff6ed869305 76774 7ff6ed886440 76773->76774 76775 7ff6ed886455 76774->76775 76776 7ff6ed886466 76775->76776 77600 7ff6eda62198 51 API calls 3 library calls 76775->77600 77599 7ff6eda61ef0 CloseHandle 76776->77599 76779 7ff6ed886485 76780 7ff6ed87dfa5 76779->76780 77601 7ff6eda62198 51 API calls 3 library calls 76779->77601 76782 7ff6ed87a030 76780->76782 76783 7ff6ed8725a0 _Mpunct 51 API calls 76782->76783 76784 7ff6ed87a060 76783->76784 76785 7ff6ed8ba140 71 API calls 76784->76785 76786 7ff6ed87a07d allocator 76785->76786 76787 7ff6ed8725a0 _Mpunct 51 API calls 76786->76787 76788 7ff6ed87a0b2 UnDecorator::getVbTableType 76787->76788 76789 7ff6ed8725a0 _Mpunct 51 API calls 76788->76789 76790 7ff6ed87a0e5 76789->76790 76791 7ff6ed8ba140 71 API calls 76790->76791 76792 7ff6ed87a102 allocator 76791->76792 76793 7ff6ed8725a0 _Mpunct 51 API calls 76792->76793 76794 7ff6ed87a137 UnDecorator::getVbTableType 76793->76794 76795 7ff6ed8725a0 _Mpunct 51 API calls 76794->76795 76796 7ff6ed87a16a 76795->76796 76797 7ff6ed8ba140 71 API calls 76796->76797 76798 7ff6ed87a187 allocator 76797->76798 76799 7ff6ed8725a0 _Mpunct 51 API calls 76798->76799 76800 7ff6ed87a1bc UnDecorator::getVbTableType 76799->76800 76801 7ff6ed8725a0 _Mpunct 51 API calls 76800->76801 76802 7ff6ed87a1ef 76801->76802 76803 7ff6ed8ba140 71 API calls 76802->76803 76804 7ff6ed87a20c allocator 76803->76804 76805 7ff6ed8725a0 _Mpunct 51 API calls 76804->76805 76806 7ff6ed87a241 UnDecorator::getVbTableType 76805->76806 76807 7ff6ed871940 59 API calls 76806->76807 76808 7ff6ed87a25a 76807->76808 76809 7ff6ed91bf80 99 API calls 76808->76809 76810 7ff6ed87a260 76809->76810 76811 7ff6ed87a47b 76810->76811 76812 7ff6ed87a269 76810->76812 77602 7ff6ed8eecb0 GetModuleFileNameW 76811->77602 76814 7ff6ed8725a0 _Mpunct 51 API calls 76812->76814 76816 7ff6ed87a28d 76814->76816 76819 7ff6ed8ba140 71 API calls 76816->76819 76817 7ff6ed87a48b 76821 7ff6ed8725a0 _Mpunct 51 API calls 76817->76821 76818 7ff6ed87a6b8 76820 7ff6ed8725a0 _Mpunct 51 API calls 76818->76820 76822 7ff6ed87a2aa 76819->76822 76825 7ff6ed871880 67 API calls 76822->76825 76828 7ff6ed87a2bc 76825->76828 76831 7ff6ed871880 67 API calls 76828->76831 76834 7ff6ed87a2ce 76831->76834 76837 7ff6ed871880 67 API calls 76834->76837 76838 7ff6ed87a2e0 76837->76838 76841 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 76838->76841 77573 7ff6ed87bde3 strrchr 77572->77573 77574 7ff6ed87be0b GetUserDefaultUILanguage LCIDToLocaleName 77573->77574 77576 7ff6ed87b9e0 77573->77576 77574->76759 77574->76760 77577 7ff6ed87b9f7 strrchr 77576->77577 77584 7ff6ed879630 77577->77584 77580 7ff6ed87ba58 UnDecorator::getVbTableType 77581 7ff6ed8927c0 UnDecorator::getVbTableType 47 API calls 77580->77581 77582 7ff6ed87bac2 UnDecorator::getVbTableType 77581->77582 77582->77574 77585 7ff6ed879642 77584->77585 77586 7ff6ed87966a 77585->77586 77589 7ff6ed8797a0 HeapAlloc 77585->77589 77586->77580 77588 7ff6ed880310 RtlPcToFileHeader RaiseException strrchr 77586->77588 77588->77580 77589->77586 77591 7ff6ed86fed0 allocator 77590->77591 77592 7ff6ed870fd0 4 API calls 77591->77592 77593 7ff6ed86fef8 allocator 77592->77593 77594 7ff6eda900c8 52 API calls 77593->77594 77595 7ff6ed86ff40 77594->77595 77597 7ff6ed86ff53 type_info::_name_internal_method 77595->77597 77598 7ff6eda62198 51 API calls 3 library calls 77595->77598 77597->76773 77598->77597 77599->76779 77600->76776 77601->76780 77603 7ff6ed8eecce 77602->77603 77621 7ff6eda965ac 77603->77621 77622 7ff6eda96601 SetCurrentDirectoryW 77621->77622 77623 7ff6eda965e2 77621->77623 77625 7ff6eda9661a 77622->77625 77626 7ff6eda9660b GetLastError 77622->77626 77646 7ff6eda89560 11 API calls memcpy_s 77623->77646 77650 7ff6eda964e8 15 API calls 4 library calls 77625->77650 77649 7ff6eda894f4 11 API calls 2 library calls 77626->77649 77628 7ff6eda965e7 77647 7ff6eda89580 11 API calls memcpy_s 77628->77647 77630 7ff6eda96656 77632 7ff6eda9665a 77630->77632 77633 7ff6eda9666d 77630->77633 77636 7ff6edaa1264 __free_lconv_mon 11 API calls 77632->77636 77638 7ff6eda965f9 77632->77638 77640 7ff6eda96687 77633->77640 77651 7ff6eda999c8 56 API calls 77633->77651 77634 7ff6eda965ee 77648 7ff6eda89414 47 API calls _invalid_parameter_noinfo_noreturn 77634->77648 77636->77638 77637 7ff6eda83630 std::_Throw_Cpp_error 8 API calls 77639 7ff6ed87a480 77637->77639 77638->77637 77639->76817 77639->76818 77640->77638 77643 7ff6edaa1264 __free_lconv_mon 11 API calls 77640->77643 77642 7ff6eda96693 SetEnvironmentVariableW 77642->77640 77644 7ff6eda966bc GetLastError 77642->77644 77643->77638 77646->77628 77647->77634 77648->77638 77649->77638 77650->77630 77651->77642 79210 7ff6ed87fc30 79211 7ff6ed87fc5c 79210->79211 79212 7ff6ed87fc85 79210->79212 79213 7ff6ed87fca6 UnDecorator::getVbTableType 79211->79213 79221 7ff6ed8802aa PostQuitMessage 79211->79221 79222 7ff6ed87fc79 79211->79222 79214 7ff6ed87fd15 79212->79214 79215 7ff6ed87fc80 79212->79215 79216 7ff6ed8802dc DefWindowProcW 79213->79216 79217 7ff6ed87ffcd 79214->79217 79218 7ff6ed87fd24 79214->79218 79215->79213 79219 7ff6ed8802b5 DefWindowProcW 79215->79219 79230 7ff6ed87fd04 79216->79230 79217->79213 79223 7ff6ed8725a0 _Mpunct 51 API calls 79217->79223 79220 7ff6ed8725a0 _Mpunct 51 API calls 79218->79220 79219->79216 79219->79230 79224 7ff6ed87fd48 79220->79224 79221->79216 79222->79215 79225 7ff6ed87fcab 79222->79225 79228 7ff6ed880000 79223->79228 79229 7ff6ed8ba140 71 API calls 79224->79229 79226 7ff6ed87fcc3 PostMessageW 79225->79226 79227 7ff6ed87fcdf 79225->79227 79226->79230 79227->79230 79231 7ff6ed87fcea PostMessageW 79227->79231 79232 7ff6ed8ba140 71 API calls 79228->79232 79233 7ff6ed87fd62 79229->79233 79231->79230 79234 7ff6ed88001d 79232->79234 79235 7ff6ed8725a0 _Mpunct 51 API calls 79233->79235 79236 7ff6ed8725a0 _Mpunct 51 API calls 79234->79236 79237 7ff6ed87fd87 79235->79237 79239 7ff6ed880042 79236->79239 79238 7ff6ed8ba140 71 API calls 79237->79238 79241 7ff6ed87fda1 79238->79241 79240 7ff6ed8ba140 71 API calls 79239->79240 79242 7ff6ed88005c 79240->79242 79243 7ff6ed8725a0 _Mpunct 51 API calls 79241->79243 79244 7ff6ed8725a0 _Mpunct 51 API calls 79242->79244 79245 7ff6ed87fdc6 79243->79245 79246 7ff6ed880081 79244->79246 79247 7ff6ed8ba140 71 API calls 79245->79247 79248 7ff6ed8ba140 71 API calls 79246->79248 79249 7ff6ed87fde0 79247->79249 79250 7ff6ed88009b 79248->79250 79251 7ff6ed871880 67 API calls 79249->79251 79252 7ff6ed871880 67 API calls 79250->79252 79253 7ff6ed87fdf2 79251->79253 79254 7ff6ed8800ad 79252->79254 79255 7ff6ed871880 67 API calls 79253->79255 79256 7ff6ed871880 67 API calls 79254->79256 79257 7ff6ed87fe04 79255->79257 79258 7ff6ed8800bf 79256->79258 79259 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79257->79259 79260 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79258->79260 79261 7ff6ed87fe27 79259->79261 79262 7ff6ed8800e2 79260->79262 79263 7ff6ed8b9730 71 API calls 79261->79263 79264 7ff6ed8b9730 71 API calls 79262->79264 79265 7ff6ed87fe44 79263->79265 79266 7ff6ed8800ff 79264->79266 79267 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79265->79267 79268 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79266->79268 79269 7ff6ed87fe8e 79267->79269 79271 7ff6ed880149 79268->79271 79270 7ff6ed8b9730 71 API calls 79269->79270 79273 7ff6ed87feab 79270->79273 79272 7ff6ed8b9730 71 API calls 79271->79272 79274 7ff6ed880166 79272->79274 79275 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79273->79275 79276 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79274->79276 79277 7ff6ed87fef5 79275->79277 79278 7ff6ed8801b3 79276->79278 79279 7ff6ed8b9730 71 API calls 79277->79279 79280 7ff6ed8b9730 71 API calls 79278->79280 79281 7ff6ed87ff12 79279->79281 79282 7ff6ed8801d0 79280->79282 79285 7ff6ed8fdb80 89 API calls 5 library calls 79281->79285 79286 7ff6ed8fdb80 89 API calls 5 library calls 79282->79286 79285->79213 79286->79213 79287 7ff6ed861751 79326 7ff6ed86a250 49 API calls 2 library calls 79287->79326 79289 7ff6ed861789 79290 7ff6ed8724b0 51 API calls 79289->79290 79291 7ff6ed8617a8 79290->79291 79327 7ff6ed86a250 49 API calls 2 library calls 79291->79327 79293 7ff6ed861809 79294 7ff6ed8724b0 51 API calls 79293->79294 79295 7ff6ed86182e 79294->79295 79328 7ff6ed86a250 49 API calls 2 library calls 79295->79328 79297 7ff6ed861895 79298 7ff6ed8724b0 51 API calls 79297->79298 79299 7ff6ed8618ba 79298->79299 79329 7ff6ed86a250 49 API calls 2 library calls 79299->79329 79301 7ff6ed861921 79302 7ff6ed8724b0 51 API calls 79301->79302 79303 7ff6ed861946 79302->79303 79330 7ff6ed86a250 49 API calls 2 library calls 79303->79330 79305 7ff6ed8619ad 79306 7ff6ed8724b0 51 API calls 79305->79306 79307 7ff6ed8619d2 79306->79307 79331 7ff6ed86a250 49 API calls 2 library calls 79307->79331 79309 7ff6ed861a39 79310 7ff6ed8724b0 51 API calls 79309->79310 79311 7ff6ed861a5e 79310->79311 79332 7ff6ed86a250 49 API calls 2 library calls 79311->79332 79313 7ff6ed861ac5 79314 7ff6ed8724b0 51 API calls 79313->79314 79315 7ff6ed861aea 79314->79315 79333 7ff6ed86a250 49 API calls 2 library calls 79315->79333 79317 7ff6ed861b51 79318 7ff6ed8724b0 51 API calls 79317->79318 79319 7ff6ed861b76 79318->79319 79334 7ff6ed86a250 49 API calls 2 library calls 79319->79334 79321 7ff6ed861bdd std::_Fac_node::_Fac_node 79335 7ff6ed872820 51 API calls 79321->79335 79323 7ff6ed861c27 UnDecorator::getVbTableType 79336 7ff6eda8339c 79323->79336 79326->79289 79327->79293 79328->79297 79329->79301 79330->79305 79331->79309 79332->79313 79333->79317 79334->79321 79335->79323 79339 7ff6eda83360 79336->79339 79338 7ff6ed861cd2 79340 7ff6eda8337a 79339->79340 79341 7ff6eda83373 79339->79341 79343 7ff6edaa08c8 79340->79343 79341->79338 79346 7ff6edaa0504 79343->79346 79353 7ff6eda9abb4 EnterCriticalSection 79346->79353 79354 7ff6ed8616f0 79359 7ff6ed86a1f0 79354->79359 79357 7ff6ed8724b0 51 API calls 79358 7ff6ed86173a 79357->79358 79360 7ff6ed86a20d allocator 79359->79360 79361 7ff6ed871820 69 API calls 79360->79361 79362 7ff6ed86171b 79361->79362 79362->79357 79363 7ff6ed8612f0 79364 7ff6ed8725a0 _Mpunct 51 API calls 79363->79364 79365 7ff6ed86130f 79364->79365 79366 7ff6ed8ba140 71 API calls 79365->79366 79367 7ff6ed861323 allocator 79366->79367 79368 7ff6ed8725a0 _Mpunct 51 API calls 79367->79368 79369 7ff6ed86134b UnDecorator::getVbTableType 79368->79369 79370 7ff6eda8339c 50 API calls 79369->79370 79371 7ff6ed861363 79370->79371 79372 7ff6ed8bb820 79373 7ff6ed8725a0 _Mpunct 51 API calls 79372->79373 79374 7ff6ed8bb84a 79373->79374 79375 7ff6ed8ba140 71 API calls 79374->79375 79376 7ff6ed8bb85e 79375->79376 79377 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79376->79377 79378 7ff6ed8bb878 79377->79378 79379 7ff6ed8b9730 71 API calls 79378->79379 79380 7ff6ed8bb88c allocator 79379->79380 79381 7ff6ed8bb89b WinHttpOpen 79380->79381 79382 7ff6ed8bb8cd UnDecorator::getVbTableType 79381->79382 79383 7ff6ed8bb8f8 WinHttpSetTimeouts 79382->79383 79384 7ff6ed8bb8e0 UnDecorator::getVbTableType 79382->79384 79383->79384 79385 7ff6ed8bb960 79386 7ff6ed8bb978 79385->79386 79392 7ff6ed8bb97f Concurrency::details::WorkQueue::IsStructuredEmpty 79385->79392 79387 7ff6ed8bba77 WaitForSingleObject 79387->79386 79387->79392 79388 7ff6ed8b7f30 57 API calls 79388->79392 79390 7ff6ed8b7fe0 ReleaseSRWLockExclusive 79390->79392 79392->79387 79392->79388 79392->79390 79393 7ff6ed8bb420 79392->79393 79406 7ff6ed8bc710 79392->79406 79394 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79393->79394 79395 7ff6ed8bb44a 79394->79395 79396 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79395->79396 79397 7ff6ed8bb46f 79396->79397 79398 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79397->79398 79399 7ff6ed8bb494 79398->79399 79400 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79399->79400 79401 7ff6ed8bb4b9 79400->79401 79402 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79401->79402 79403 7ff6ed8bb4de 79402->79403 79404 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79403->79404 79405 7ff6ed8bb503 79404->79405 79405->79392 79407 7ff6ed8bc751 allocator std::ios_base::good 79406->79407 79420 7ff6ed8bc7f0 UnDecorator::getVbTableType 79406->79420 79408 7ff6ed8bc7ac WinHttpConnect 79407->79408 79409 7ff6ed8bc7f7 79408->79409 79410 7ff6ed871940 59 API calls 79409->79410 79409->79420 79411 7ff6ed8bc80d GetTickCount64 79410->79411 79412 7ff6ed8bcb56 allocator std::ios_base::good 79411->79412 79413 7ff6ed87baf0 69 API calls 79412->79413 79414 7ff6ed8bcc27 allocator 79413->79414 79415 7ff6ed8bcc32 WinHttpOpenRequest 79414->79415 79416 7ff6ed8bcc71 WinHttpSetTimeouts 79415->79416 79422 7ff6ed8bccdc UnDecorator::getVbTableType 79415->79422 79417 7ff6ed8bcc99 79416->79417 79416->79422 79418 7ff6ed8bcca1 WinHttpCloseHandle 79417->79418 79419 7ff6ed8bccad 79417->79419 79418->79419 79419->79420 79421 7ff6ed8bccb5 WinHttpCloseHandle 79419->79421 79420->79392 79421->79420 79423 7ff6ed8bcd25 79422->79423 79424 7ff6ed8bccf5 WinHttpSendRequest 79422->79424 79425 7ff6ed8bcd3d 79423->79425 79426 7ff6ed8bcd2c WinHttpReceiveResponse 79423->79426 79424->79423 79427 7ff6ed8bcd51 79425->79427 79428 7ff6ed8bcd45 WinHttpCloseHandle 79425->79428 79426->79425 79427->79420 79429 7ff6ed8bcd59 WinHttpCloseHandle 79427->79429 79428->79427 79429->79420 79430 7ff6ed8dccc0 GetWindowTextW 79431 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79430->79431 79432 7ff6ed8dcd1b 79431->79432 79433 7ff6ed8b9730 71 API calls 79432->79433 79434 7ff6ed8dcd2f allocator ProcessCodePage 79433->79434 79435 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79434->79435 79439 7ff6ed8dcd99 allocator ProcessCodePage UnDecorator::getVbTableType 79434->79439 79436 7ff6ed8dcd85 79435->79436 79437 7ff6ed8b9730 71 API calls 79436->79437 79437->79439 79438 7ff6ed8dce6e 79439->79438 79440 7ff6ed8725a0 _Mpunct 51 API calls 79439->79440 79441 7ff6ed8dce43 79440->79441 79445 7ff6ed8d8960 51 API calls allocator 79441->79445 79443 7ff6ed8dce56 79444 7ff6ed875200 shared_ptr 47 API calls 79443->79444 79444->79438 79445->79443 79446 7ff6ed86e7c0 79447 7ff6ed86e7d8 allocator _aligned_msize type_info::_name_internal_method 79446->79447 79452 7ff6ed870ee0 79447->79452 79451 7ff6ed86e829 79457 7ff6ed87c850 79452->79457 79476 7ff6ed87c9d0 79452->79476 79453 7ff6ed86e824 79456 7ff6eda61f84 60 API calls std::_Throw_Cpp_error 79453->79456 79456->79451 79458 7ff6ed8725a0 _Mpunct 51 API calls 79457->79458 79459 7ff6ed87c87a 79458->79459 79460 7ff6ed8ba140 71 API calls 79459->79460 79461 7ff6ed87c88e allocator 79460->79461 79462 7ff6ed8725a0 _Mpunct 51 API calls 79461->79462 79463 7ff6ed87c8b4 UnDecorator::getVbTableType 79462->79463 79464 7ff6ed8724b0 51 API calls 79463->79464 79465 7ff6ed87c8dc allocator 79464->79465 79466 7ff6ed87c8ff OpenEventW 79465->79466 79468 7ff6ed87c91e UnDecorator::getVbTableType 79466->79468 79551 7ff6eda3f9a0 79468->79551 79768 7ff6eda40980 79468->79768 79471 7ff6ed87c948 79472 7ff6ed87c95c 79471->79472 79473 7ff6ed87c950 CloseHandle 79471->79473 79474 7ff6ed875200 shared_ptr 47 API calls 79472->79474 79473->79472 79475 7ff6ed87c966 79474->79475 79475->79453 79477 7ff6ed8725a0 _Mpunct 51 API calls 79476->79477 79478 7ff6ed87ca01 79477->79478 79479 7ff6ed8ba140 71 API calls 79478->79479 79480 7ff6ed87ca1b 79479->79480 79481 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79480->79481 79482 7ff6ed87ca80 79481->79482 79483 7ff6ed8b9730 71 API calls 79482->79483 79484 7ff6ed87ca9d allocator UnDecorator::getVbTableType 79483->79484 79485 7ff6ed87cac7 RegisterClassExW 79484->79485 79486 7ff6ed87caed 79485->79486 79494 7ff6ed87cadd UnDecorator::getVbTableType 79485->79494 79487 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79486->79487 79488 7ff6ed87cb23 79487->79488 79489 7ff6ed8b9730 71 API calls 79488->79489 79490 7ff6ed87cb40 allocator 79489->79490 79491 7ff6ed87cb55 CreateWindowExW 79490->79491 79492 7ff6ed87cbda UnDecorator::getVbTableType 79491->79492 79493 7ff6ed87cbfa ShowWindow 79492->79493 79492->79494 79495 7ff6ed87cc24 79493->79495 79494->79453 79496 7ff6ed88e190 51 API calls 79495->79496 79497 7ff6ed87cc5b 79496->79497 79498 7ff6ed88dc30 51 API calls 79497->79498 79499 7ff6ed87cc6d 79498->79499 79500 7ff6ed8725a0 _Mpunct 51 API calls 79499->79500 79501 7ff6ed87ccab 79500->79501 79502 7ff6ed8ba140 71 API calls 79501->79502 79503 7ff6ed87ccc8 79502->79503 79504 7ff6ed8725a0 _Mpunct 51 API calls 79503->79504 79505 7ff6ed87cced 79504->79505 79506 7ff6ed8ba140 71 API calls 79505->79506 79507 7ff6ed87cd0a 79506->79507 79508 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79507->79508 79509 7ff6ed87cd30 79508->79509 79510 7ff6ed8b9730 71 API calls 79509->79510 79511 7ff6ed87cd4d 79510->79511 79512 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79511->79512 79513 7ff6ed87cd9a 79512->79513 79514 7ff6ed8b9730 71 API calls 79513->79514 79515 7ff6ed87cdb7 79514->79515 79516 7ff6ed877050 60 API calls 79515->79516 79517 7ff6ed87cdeb 79516->79517 81061 7ff6ed876f80 79517->81061 79519 7ff6ed87ce30 allocator UnDecorator::getVbTableType 79520 7ff6ed8766f0 task 51 API calls 79519->79520 79523 7ff6ed87d878 UnDecorator::getVbTableType 79519->79523 79530 7ff6ed8725a0 51 API calls _Mpunct 79519->79530 79533 7ff6ed87d6fe OpenEventW 79519->79533 79535 7ff6ed87d6e9 79519->79535 79539 7ff6ed8ba140 71 API calls 79519->79539 79540 7ff6ed871880 67 API calls 79519->79540 79546 7ff6ed8717c0 49 API calls Concurrency::details::SchedulerBase::GetPolicy 79519->79546 79547 7ff6ed8fdb80 89 API calls 79519->79547 79548 7ff6ed88ef80 75 API calls 79519->79548 79549 7ff6ed8b9730 71 API calls 79519->79549 79550 7ff6ed8856a0 107 API calls 79519->79550 81070 7ff6ed8f5960 keybd_event keybd_event 79519->81070 81071 7ff6ed8db3a0 53 API calls 2 library calls 79519->81071 79521 7ff6ed87ce87 GetForegroundWindow 79520->79521 79524 7ff6ed87cecf Concurrency::details::WorkQueue::IsStructuredEmpty 79521->79524 79522 7ff6ed87cea2 GetWindowTextW 79522->79524 79528 7ff6ed875200 shared_ptr 47 API calls 79523->79528 79524->79522 79525 7ff6ed87cf02 PeekMessageW 79524->79525 79526 7ff6ed87cf32 TranslateMessage DispatchMessageW 79525->79526 79527 7ff6ed87d6c1 SleepEx 79525->79527 79526->79519 79527->79519 79529 7ff6ed87d8c1 79528->79529 79531 7ff6ed875200 shared_ptr 47 API calls 79529->79531 79530->79519 79531->79494 79533->79519 79534 7ff6ed87d722 WaitForSingleObject 79533->79534 79534->79519 79542 7ff6ed87d73a allocator UnDecorator::getVbTableType 79534->79542 79535->79519 79537 7ff6ed8725a0 51 API calls _Mpunct 79537->79542 79538 7ff6ed8ba140 71 API calls 79538->79542 79539->79519 79540->79519 79541 7ff6ed8724b0 51 API calls 79541->79542 79542->79537 79542->79538 79542->79541 79543 7ff6ed90e3c0 81 API calls 79542->79543 79544 7ff6ed87d858 CloseHandle 79543->79544 79545 7ff6ed875200 shared_ptr 47 API calls 79544->79545 79545->79535 79546->79519 79547->79519 79548->79519 79549->79519 79550->79519 79552 7ff6ed872330 _Mpunct 51 API calls 79551->79552 79553 7ff6eda3f9ce 79552->79553 79985 7ff6ed8ba340 79553->79985 79556 7ff6ed872330 _Mpunct 51 API calls 79557 7ff6eda3fa10 79556->79557 79558 7ff6ed8ba340 88 API calls 79557->79558 79559 7ff6eda3fa2d 79558->79559 79560 7ff6ed872330 _Mpunct 51 API calls 79559->79560 79561 7ff6eda3fa52 79560->79561 79562 7ff6ed8ba340 88 API calls 79561->79562 79563 7ff6eda3fa6f 79562->79563 79564 7ff6ed872330 _Mpunct 51 API calls 79563->79564 79565 7ff6eda3fa94 79564->79565 79566 7ff6ed8ba340 88 API calls 79565->79566 79567 7ff6eda3fab1 79566->79567 79568 7ff6ed872330 _Mpunct 51 API calls 79567->79568 79569 7ff6eda3fad6 79568->79569 79570 7ff6ed8ba340 88 API calls 79569->79570 79571 7ff6eda3faf3 79570->79571 80015 7ff6ed872290 79571->80015 79582 7ff6ed89abc0 shared_ptr 47 API calls 79583 7ff6eda3fbdb 79582->79583 79584 7ff6ed89abc0 shared_ptr 47 API calls 79583->79584 79585 7ff6eda3fbe9 79584->79585 79586 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79585->79586 79587 7ff6eda3fbf7 79586->79587 80070 7ff6eda48070 79587->80070 79590 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79591 7ff6eda3fc3e 79590->79591 79592 7ff6ed8b9e20 54 API calls 79591->79592 79769 7ff6ed872330 _Mpunct 51 API calls 79768->79769 79770 7ff6eda409ae 79769->79770 79771 7ff6ed8ba340 88 API calls 79770->79771 79772 7ff6eda409cb 79771->79772 79773 7ff6ed872330 _Mpunct 51 API calls 79772->79773 79774 7ff6eda409f0 79773->79774 79775 7ff6ed8ba340 88 API calls 79774->79775 79776 7ff6eda40a0d 79775->79776 79777 7ff6ed872330 _Mpunct 51 API calls 79776->79777 79778 7ff6eda40a32 79777->79778 79779 7ff6ed8ba340 88 API calls 79778->79779 79780 7ff6eda40a4f 79779->79780 79781 7ff6ed872330 _Mpunct 51 API calls 79780->79781 79782 7ff6eda40a74 79781->79782 79783 7ff6ed8ba340 88 API calls 79782->79783 79784 7ff6eda40a91 79783->79784 79785 7ff6ed872330 _Mpunct 51 API calls 79784->79785 79786 7ff6eda40ab6 79785->79786 79787 7ff6ed8ba340 88 API calls 79786->79787 79788 7ff6eda40ad3 79787->79788 79789 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79788->79789 79790 7ff6eda40af9 79789->79790 79791 7ff6ed8b9e20 54 API calls 79790->79791 79792 7ff6eda40b16 79791->79792 79793 7ff6ed900120 54 API calls 79792->79793 79794 7ff6eda40b46 79793->79794 79795 7ff6eda3d330 52 API calls 79794->79795 79796 7ff6eda40b78 79795->79796 79797 7ff6ed8f9120 51 API calls 79796->79797 79798 7ff6eda40bad 79797->79798 79799 7ff6ed89abc0 shared_ptr 47 API calls 79798->79799 79800 7ff6eda40bbb 79799->79800 79801 7ff6ed89abc0 shared_ptr 47 API calls 79800->79801 79802 7ff6eda40bc9 79801->79802 79803 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79802->79803 79804 7ff6eda40bd7 79803->79804 79805 7ff6eda48070 125 API calls 79804->79805 79806 7ff6eda40bf8 79805->79806 79807 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79806->79807 79808 7ff6eda40c1e 79807->79808 79809 7ff6ed8b9e20 54 API calls 79808->79809 79810 7ff6eda40c3b 79809->79810 79811 7ff6ed900120 54 API calls 79810->79811 79812 7ff6eda40c6b 79811->79812 79813 7ff6ed8f9120 51 API calls 79812->79813 79814 7ff6eda40c89 79813->79814 79815 7ff6ed8ec7b0 75 API calls 79814->79815 79816 7ff6eda40cae 79815->79816 79817 7ff6ed89abc0 shared_ptr 47 API calls 79816->79817 79818 7ff6eda40cbf 79817->79818 79819 7ff6ed89abc0 shared_ptr 47 API calls 79818->79819 79820 7ff6eda40ccd 79819->79820 79821 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79820->79821 79822 7ff6eda40cdb 79821->79822 79823 7ff6eda40dcf 79822->79823 79824 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79822->79824 79825 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79823->79825 79826 7ff6eda40d0d 79824->79826 79827 7ff6eda40df5 79825->79827 79828 7ff6ed8b9e20 54 API calls 79826->79828 79829 7ff6ed8b9e20 54 API calls 79827->79829 79830 7ff6eda40d2a 79828->79830 79831 7ff6eda40e12 79829->79831 79833 7ff6ed900120 54 API calls 79830->79833 79832 7ff6ed900120 54 API calls 79831->79832 79835 7ff6eda40e42 79832->79835 79834 7ff6eda40d5a 79833->79834 79836 7ff6ed8f9120 51 API calls 79834->79836 79837 7ff6ed8f9120 51 API calls 79835->79837 79838 7ff6eda40d78 79836->79838 79839 7ff6eda40e60 79837->79839 81053 7ff6eda48560 51 API calls allocator 79838->81053 79841 7ff6ed8ec7b0 75 API calls 79839->79841 79843 7ff6eda40e85 79841->79843 79842 7ff6eda40da5 79844 7ff6ed89abc0 shared_ptr 47 API calls 79842->79844 79845 7ff6ed89abc0 shared_ptr 47 API calls 79843->79845 79846 7ff6eda40db3 79844->79846 79847 7ff6eda40e96 79845->79847 79848 7ff6ed89abc0 shared_ptr 47 API calls 79846->79848 79849 7ff6ed89abc0 shared_ptr 47 API calls 79847->79849 79850 7ff6eda40dc1 79848->79850 79851 7ff6eda40ea4 79849->79851 79852 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79850->79852 79853 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79851->79853 79852->79823 79854 7ff6eda40eb2 79853->79854 79855 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79854->79855 79857 7ff6eda40fa6 HandleT Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 79854->79857 79856 7ff6eda40ee4 79855->79856 79858 7ff6ed8b9e20 54 API calls 79856->79858 79863 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79857->79863 79866 7ff6eda412ad 79857->79866 79859 7ff6eda40f01 79858->79859 79860 7ff6ed900120 54 API calls 79859->79860 79861 7ff6eda40f31 79860->79861 79862 7ff6ed8f9120 51 API calls 79861->79862 79864 7ff6eda40f4f 79862->79864 79865 7ff6eda41027 79863->79865 81054 7ff6eda48560 51 API calls allocator 79864->81054 79868 7ff6ed8b9e20 54 API calls 79865->79868 79869 7ff6ed8725a0 _Mpunct 51 API calls 79866->79869 79984 7ff6eda4188d UnDecorator::getVbTableType 79866->79984 79871 7ff6eda41044 79868->79871 79873 7ff6eda412ec 79869->79873 79870 7ff6eda40f7c 79874 7ff6ed89abc0 shared_ptr 47 API calls 79870->79874 79875 7ff6ed900120 54 API calls 79871->79875 79872 7ff6eda3cc90 47 API calls 79876 7ff6eda418e9 79872->79876 79878 7ff6ed8ba140 71 API calls 79873->79878 79879 7ff6eda40f8a 79874->79879 79880 7ff6eda41074 79875->79880 79877 7ff6eda3cc70 47 API calls 79876->79877 79881 7ff6eda418f4 79877->79881 79882 7ff6eda41309 79878->79882 79883 7ff6ed89abc0 shared_ptr 47 API calls 79879->79883 79884 7ff6ed8f9120 51 API calls 79880->79884 79885 7ff6ed89abc0 shared_ptr 47 API calls 79881->79885 79886 7ff6ed8725a0 _Mpunct 51 API calls 79882->79886 79887 7ff6eda40f98 79883->79887 79888 7ff6eda4108f 79884->79888 79889 7ff6eda41902 79885->79889 79890 7ff6eda4132e 79886->79890 79891 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79887->79891 79892 7ff6ed8ec7b0 75 API calls 79888->79892 79893 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79889->79893 79894 7ff6ed8ba140 71 API calls 79890->79894 79891->79857 79895 7ff6eda410b4 79892->79895 79896 7ff6eda41910 79893->79896 79897 7ff6eda4134b 79894->79897 79898 7ff6ed89abc0 shared_ptr 47 API calls 79895->79898 79899 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79896->79899 79900 7ff6ed8725a0 _Mpunct 51 API calls 79897->79900 79901 7ff6eda410c5 79898->79901 79903 7ff6eda4191e 79899->79903 79904 7ff6eda41370 79900->79904 79902 7ff6ed89abc0 shared_ptr 47 API calls 79901->79902 79905 7ff6eda410d3 79902->79905 79906 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79903->79906 79907 7ff6ed8ba140 71 API calls 79904->79907 79909 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79905->79909 79910 7ff6eda4192c 79906->79910 79908 7ff6eda4138d 79907->79908 79911 7ff6ed8725a0 _Mpunct 51 API calls 79908->79911 79912 7ff6eda410e1 79909->79912 79913 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79910->79913 79914 7ff6eda413b2 79911->79914 79912->79866 79917 7ff6ed872290 std::ios_base::failure::failure 51 API calls 79912->79917 79915 7ff6eda4193a 79913->79915 79916 7ff6ed8ba140 71 API calls 79914->79916 79918 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79915->79918 79923 7ff6eda413cf 79916->79923 79919 7ff6eda41113 79917->79919 79920 7ff6ed87c929 WaitForSingleObject 79918->79920 79921 7ff6ed8b9e20 54 API calls 79919->79921 79920->79468 79920->79471 79922 7ff6eda41130 79921->79922 79924 7ff6ed900120 54 API calls 79922->79924 81056 7ff6eda3bd20 47 API calls 79923->81056 79925 7ff6eda41160 79924->79925 79927 7ff6ed8f9120 51 API calls 79925->79927 79928 7ff6eda4117b 79927->79928 79929 7ff6eda47ab0 144 API calls 79928->79929 79930 7ff6eda411a8 79929->79930 79931 7ff6ed89abc0 shared_ptr 47 API calls 79930->79931 79932 7ff6eda411b6 79931->79932 79933 7ff6ed89abc0 shared_ptr 47 API calls 79932->79933 79935 7ff6eda411c4 79933->79935 79934 7ff6eda4141f 81057 7ff6eda3bfa0 47 API calls 79934->81057 79937 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79935->79937 79941 7ff6eda411d2 79937->79941 79938 7ff6eda41482 81058 7ff6eda486d0 51 API calls 79938->81058 79940 7ff6eda414d6 79942 7ff6ed871940 59 API calls 79940->79942 81055 7ff6eda3bba0 51 API calls 2 library calls 79941->81055 79944 7ff6eda414e1 79942->79944 79946 7ff6ed8725a0 _Mpunct 51 API calls 79944->79946 79945 7ff6eda4129f 79947 7ff6eda3cc70 47 API calls 79945->79947 79948 7ff6eda41506 79946->79948 79947->79866 79949 7ff6ed8ba140 71 API calls 79948->79949 79950 7ff6eda41520 79949->79950 81059 7ff6eda35cc0 51 API calls 2 library calls 79950->81059 79952 7ff6eda41533 81060 7ff6ed89e0a0 51 API calls 3 library calls 79952->81060 79954 7ff6eda4155f Concurrency::details::WorkQueue::IsStructuredEmpty 79955 7ff6ed871820 69 API calls 79954->79955 79956 7ff6eda41594 79955->79956 79957 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79956->79957 79958 7ff6eda415e1 79957->79958 79959 7ff6ed8b9730 71 API calls 79958->79959 79960 7ff6eda415fe allocator 79959->79960 79961 7ff6ed87baf0 69 API calls 79960->79961 79962 7ff6eda41645 UnDecorator::getVbTableType 79961->79962 79963 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 79962->79963 79964 7ff6eda4166f 79963->79964 79965 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79964->79965 79966 7ff6eda41695 79965->79966 79967 7ff6ed8b9730 71 API calls 79966->79967 79968 7ff6eda416b2 79967->79968 79969 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79968->79969 79970 7ff6eda416ff 79969->79970 79971 7ff6ed8b9730 71 API calls 79970->79971 79972 7ff6eda4171c 79971->79972 79973 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79972->79973 79974 7ff6eda41769 79973->79974 79975 7ff6ed8b9730 71 API calls 79974->79975 79976 7ff6eda41786 79975->79976 79977 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 79976->79977 79978 7ff6eda417d3 79977->79978 79984->79872 79986 7ff6ed8725a0 _Mpunct 51 API calls 79985->79986 79987 7ff6ed8ba36d 79986->79987 79988 7ff6ed8b8a10 51 API calls 79987->79988 79989 7ff6ed8ba380 79988->79989 79990 7ff6ed8b8e60 type_info::_name_internal_method 51 API calls 79989->79990 79991 7ff6ed8ba396 79990->79991 80214 7ff6ed8ae1e0 79991->80214 79994 7ff6ed8ba700 51 API calls 79995 7ff6ed8ba3d5 79994->79995 79996 7ff6ed8b89e0 type_info::_name_internal_method 51 API calls 79995->79996 79997 7ff6ed8ba3f6 79996->79997 79998 7ff6ed875200 shared_ptr 47 API calls 79997->79998 79999 7ff6ed8ba404 79998->79999 80000 7ff6ed875200 shared_ptr 47 API calls 79999->80000 80001 7ff6ed8ba412 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= 80000->80001 80002 7ff6ed8b9270 51 API calls 80001->80002 80006 7ff6ed8ba44d shared_ptr 80002->80006 80003 7ff6ed8ba504 std::ios_base::failure::failure 80005 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 80003->80005 80007 7ff6ed8ba531 80005->80007 80006->80003 80223 7ff6ed8b8aa0 47 API calls 80006->80223 80224 7ff6ed8ba570 51 API calls 2 library calls 80006->80224 80008 7ff6ed875200 shared_ptr 47 API calls 80007->80008 80010 7ff6ed8ba53f 80008->80010 80011 7ff6ed875200 shared_ptr 47 API calls 80010->80011 80012 7ff6ed8ba54d 80011->80012 80013 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 80012->80013 80014 7ff6ed8ba55b 80013->80014 80014->79556 80016 7ff6ed8722b2 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl _aligned_msize 80015->80016 80283 7ff6ed86c0d0 80016->80283 80018 7ff6ed872316 80019 7ff6ed8b9e20 80018->80019 80022 7ff6ed8b9e4b shared_ptr 80019->80022 80020 7ff6ed8b8eb0 54 API calls 80021 7ff6ed8b9ef9 80020->80021 80023 7ff6ed8b9f0a 80021->80023 80028 7ff6ed8b9f47 allocator 80021->80028 80022->80020 80024 7ff6ed8b8840 47 API calls 80023->80024 80025 7ff6ed8b9f2c 80024->80025 80026 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 80025->80026 80027 7ff6ed8b9f3a 80026->80027 80044 7ff6ed900120 80027->80044 80291 7ff6ed869fd0 51 API calls 4 library calls 80028->80291 80030 7ff6ed8b9fdd allocator 80292 7ff6ed869fd0 51 API calls 4 library calls 80030->80292 80032 7ff6ed8ba092 80033 7ff6ed8ba700 51 API calls 80032->80033 80034 7ff6ed8ba0b0 80033->80034 80035 7ff6ed875200 shared_ptr 47 API calls 80034->80035 80036 7ff6ed8ba0f5 80035->80036 80037 7ff6ed875200 shared_ptr 47 API calls 80036->80037 80038 7ff6ed8ba103 80037->80038 80039 7ff6ed875200 shared_ptr 47 API calls 80038->80039 80040 7ff6ed8ba111 80039->80040 80041 7ff6ed8b8840 47 API calls 80040->80041 80042 7ff6ed8ba11c 80041->80042 80043 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 80042->80043 80043->80027 80293 7ff6ed900740 80044->80293 80047 7ff6eda3d330 80048 7ff6eda3d363 80047->80048 80049 7ff6eda3d36e 80048->80049 80050 7ff6eda3d394 80048->80050 80328 7ff6eda35a90 51 API calls 80049->80328 80329 7ff6ed8be9e0 51 API calls 80050->80329 80053 7ff6eda3d3a6 CoTaskMemFree 80054 7ff6eda3d3c0 80053->80054 80055 7ff6ed89abc0 shared_ptr 47 API calls 80054->80055 80056 7ff6eda3d382 80055->80056 80057 7ff6ed8f9120 80056->80057 80061 7ff6ed8f9150 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= std::_Is_slash_oper::operator 80057->80061 80058 7ff6ed8f932b 80331 7ff6ed8990a0 80058->80331 80061->80058 80065 7ff6ed8f91c2 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= std::_Is_slash_oper::operator 80061->80065 80063 7ff6ed8f9356 80064 7ff6ed89abc0 shared_ptr 47 API calls 80063->80064 80069 7ff6ed8f9321 80064->80069 80330 7ff6ed8f8710 51 API calls 2 library calls 80065->80330 80067 7ff6ed8f92f9 80068 7ff6ed89abc0 shared_ptr 47 API calls 80067->80068 80068->80069 80069->79582 80071 7ff6eda48096 80070->80071 80072 7ff6ed8ec7b0 75 API calls 80071->80072 80073 7ff6eda480a4 80072->80073 80081 7ff6eda48406 80073->80081 80357 7ff6eda47980 80073->80357 80076 7ff6eda3cc90 47 API calls 80077 7ff6eda3fc18 80076->80077 80077->79590 80081->80076 80225 7ff6ed8a6b30 80214->80225 80216 7ff6ed8ae203 80232 7ff6ed8ac280 80216->80232 80218 7ff6ed8ae21b 80219 7ff6ed875200 shared_ptr 47 API calls 80218->80219 80220 7ff6ed8ae242 80219->80220 80236 7ff6ed8a7180 80220->80236 80222 7ff6ed8ae24d 80222->79994 80223->80006 80224->80006 80226 7ff6ed8748b0 std::ios_base::_Init 59 API calls 80225->80226 80227 7ff6ed8a6b59 80226->80227 80228 7ff6eda83130 std::_Facet_Register 4 API calls 80227->80228 80229 7ff6ed8a6ba3 80228->80229 80231 7ff6ed8a6bbc 80229->80231 80241 7ff6ed8a6830 87 API calls std::bad_exception::bad_exception 80229->80241 80231->80216 80233 7ff6ed8ac2a5 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= 80232->80233 80242 7ff6ed8ac2f0 80233->80242 80237 7ff6ed875200 shared_ptr 47 API calls 80236->80237 80238 7ff6ed8a71a9 80237->80238 80239 7ff6ed8751d0 Concurrency::details::HardwareAffinity::operator!= 47 API calls 80238->80239 80240 7ff6ed8a71ba type_info::_name_internal_method 80239->80240 80240->80222 80241->80231 80243 7ff6ed8ac31e 80242->80243 80244 7ff6ed884920 51 API calls 80243->80244 80245 7ff6ed8ac381 80244->80245 80246 7ff6ed8ac61b 80245->80246 80250 7ff6ed8ac3cc Concurrency::details::HardwareAffinity::operator!= 80245->80250 80247 7ff6ed875200 shared_ptr 47 API calls 80246->80247 80248 7ff6ed8ac648 80247->80248 80249 7ff6ed875200 shared_ptr 47 API calls 80248->80249 80251 7ff6ed8ac2d6 80249->80251 80252 7ff6ed8ac498 80250->80252 80253 7ff6ed8ac488 80250->80253 80251->80218 80254 7ff6ed8ac4a4 80252->80254 80255 7ff6ed8ac4d2 Concurrency::details::HardwareAffinity::operator!= 80252->80255 80256 7ff6ed8ac493 80253->80256 80269 7ff6ed8ac567 80253->80269 80257 7ff6ed884820 type_info::_name_internal_method 51 API calls 80254->80257 80258 7ff6ed8ac4e2 80255->80258 80259 7ff6ed8ac4f7 80255->80259 80261 7ff6ed8ac5be 80256->80261 80262 7ff6ed8ac609 80256->80262 80260 7ff6ed8ac4cc 80257->80260 80263 7ff6ed884920 51 API calls 80258->80263 80265 7ff6ed8ac555 80259->80265 80266 7ff6ed8ac507 80259->80266 80267 7ff6ed8724b0 51 API calls 80261->80267 80282 7ff6ed8a96d0 51 API calls 2 library calls 80262->80282 80263->80260 80280 7ff6ed8a96d0 51 API calls 2 library calls 80265->80280 80270 7ff6ed8724b0 51 API calls 80266->80270 80271 7ff6ed8ac5da 80267->80271 80269->80260 80281 7ff6ed8ad0e0 51 API calls 2 library calls 80269->80281 80273 7ff6ed8ac523 80270->80273 80274 7ff6ed875200 shared_ptr 47 API calls 80271->80274 80275 7ff6ed875200 shared_ptr 47 API calls 80273->80275 80276 7ff6ed8ac5f2 80274->80276 80277 7ff6ed8ac53b 80275->80277 80278 7ff6ed875200 shared_ptr 47 API calls 80276->80278 80279 7ff6ed875200 shared_ptr 47 API calls 80277->80279 80278->80251 80279->80251 80280->80260 80281->80269 80282->80260 80284 7ff6ed86c0f7 Concurrency::task_continuation_context::task_continuation_context 80283->80284 80287 7ff6ed86c106 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error _Mpunct Concurrency::task_continuation_context::task_continuation_context 80284->80287 80289 7ff6ed884450 51 API calls _Mpunct 80284->80289 80286 7ff6ed86c142 std::_Throw_Cpp_error allocator _Mpunct 80286->80018 80287->80286 80290 7ff6ed86b900 49 API calls Concurrency::task_continuation_context::task_continuation_context 80287->80290 80289->80287 80290->80286 80291->80030 80292->80032 80294 7ff6ed90076c 80293->80294 80297 7ff6ed8f84e0 80294->80297 80302 7ff6eda677e8 80297->80302 80303 7ff6eda9afa8 __std_fs_code_page 47 API calls 80302->80303 80304 7ff6eda677f1 80303->80304 80305 7ff6eda677fa AreFileApisANSI 80304->80305 80306 7ff6ed8f8516 80304->80306 80305->80306 80307 7ff6ed8fa2a0 80306->80307 80309 7ff6ed8fa2c7 allocator List 80307->80309 80308 7ff6ed8fa3d1 80310 7ff6ed875200 shared_ptr 47 API calls 80308->80310 80309->80308 80313 7ff6ed8fa2ff allocator 80309->80313 80323 7ff6ed8e5460 51 API calls 2 library calls 80309->80323 80311 7ff6ed8f8544 80310->80311 80311->80047 80324 7ff6eda67810 MultiByteToWideChar GetLastError 80313->80324 80315 7ff6ed8fa344 80325 7ff6ed8dfc50 51 API calls 80315->80325 80317 7ff6ed8fa353 80318 7ff6ed88e190 51 API calls 80317->80318 80319 7ff6ed8fa36c Concurrency::details::WorkQueue::IsStructuredEmpty allocator 80318->80319 80326 7ff6eda67810 MultiByteToWideChar GetLastError 80319->80326 80321 7ff6ed8fa3c2 80327 7ff6ed8dfc50 51 API calls 80321->80327 80323->80313 80324->80315 80325->80317 80326->80321 80327->80308 80328->80056 80329->80053 80330->80067 80332 7ff6ed8724b0 51 API calls 80331->80332 80333 7ff6ed8990ca 80332->80333 80334 7ff6ed8f9500 80333->80334 80335 7ff6ed8f951b 80334->80335 80336 7ff6ed8f9522 80335->80336 80338 7ff6ed8f953c Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::HardwareAffinity::operator!= 80335->80338 80352 7ff6ed8f8e70 51 API calls task 80336->80352 80339 7ff6ed8f960d std::_Is_slash_oper::operator 80338->80339 80343 7ff6ed8f95f3 80338->80343 80340 7ff6ed8f9667 80339->80340 80346 7ff6ed8f9634 80339->80346 80341 7ff6ed8f9673 80340->80341 80342 7ff6ed8f96aa std::_Is_slash_oper::operator 80340->80342 80347 7ff6ed8f9661 80341->80347 80355 7ff6ed8ad0e0 51 API calls 2 library calls 80341->80355 80342->80347 80356 7ff6ed8ad0e0 51 API calls 2 library calls 80342->80356 80353 7ff6ed8f8e70 51 API calls task 80343->80353 80354 7ff6ed8faba0 51 API calls type_info::_name_internal_method 80346->80354 80349 7ff6ed884820 type_info::_name_internal_method 51 API calls 80347->80349 80348 7ff6ed8f9537 80348->80063 80349->80348 80352->80348 80353->80348 80354->80347 80355->80347 80356->80347 80370 7ff6eda48830 80357->80370 80375 7ff6ed8e2160 80370->80375 80376 7ff6ed8e217f Concurrency::details::WorkQueue::IsStructuredEmpty 80375->80376 80380 7ff6eda67b38 80376->80380 80384 7ff6eda67b7a 80380->80384 81053->79842 81054->79870 81055->79945 81056->79934 81057->79938 81058->79940 81059->79952 81060->79954 81062 7ff6ed87c020 57 API calls 81061->81062 81063 7ff6ed876fa5 81062->81063 81064 7ff6ed8717f0 2 API calls 81063->81064 81065 7ff6ed876fb2 allocator std::ios_base::good 81064->81065 81066 7ff6ed879e80 50 API calls 81065->81066 81067 7ff6ed877014 81066->81067 81068 7ff6ed8717c0 Concurrency::details::SchedulerBase::GetPolicy 49 API calls 81067->81068 81069 7ff6ed877023 UnDecorator::getVbTableType 81068->81069 81069->79519 81070->79535 81071->79519

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 0 7ff6ed8e9de0-7ff6ed8e9ea2 call 7ff6ed872600 * 2 call 7ff6ed8ae130 call 7ff6ed871880 call 7ff6ed86e380 call 7ff6ed8d4be0 call 7ff6ed8d5650 call 7ff6ed8cfe80 17 7ff6ed8e9f71 0->17 18 7ff6ed8e9ea8-7ff6ed8e9f0c call 7ff6ed8d89a0 call 7ff6ed8f6300 call 7ff6ed887820 0->18 19 7ff6ed8e9f7c-7ff6ed8e9f91 17->19 18->17 40 7ff6ed8e9f0e-7ff6ed8e9f62 call 7ff6ed8d89a0 call 7ff6ed8f6300 call 7ff6ed887820 18->40 21 7ff6ed8e9f93-7ff6ed8e9fa5 call 7ff6ed875200 19->21 22 7ff6ed8e9fa6-7ff6ed8e9faf 19->22 21->22 24 7ff6ed8e9fc4-7ff6ed8e9fcb 22->24 25 7ff6ed8e9fb1-7ff6ed8e9fc3 call 7ff6ed875200 22->25 29 7ff6ed8ea062-7ff6ed8ea1a4 call 7ff6ed871940 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 call 7ff6ed87baf0 call 7ff6ed874b20 call 7ff6ed8bdc30 call 7ff6eda84230 call 7ff6ed874b20 * 2 24->29 30 7ff6ed8e9fd1-7ff6ed8ea05d call 7ff6ed8f62a0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed8f62a0 call 7ff6ed876670 call 7ff6ed875200 24->30 25->24 68 7ff6ed8ea1a5-7ff6ed8ea270 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 WinHttpOpen call 7ff6ed874b20 29->68 30->68 40->17 61 7ff6ed8e9f64-7ff6ed8e9f6f 40->61 61->19 93 7ff6ed8ea37d-7ff6ed8ea3a3 WinHttpSetTimeouts 68->93 94 7ff6ed8ea276-7ff6ed8ea37c call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 68->94 96 7ff6ed8ea4bc-7ff6ed8ea4ea call 7ff6ed884d70 WinHttpConnect 93->96 97 7ff6ed8ea3a9-7ff6ed8ea4bb WinHttpCloseHandle call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 93->97 94->93 106 7ff6ed8ea603-7ff6ed8ea70a call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed884d70 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 WinHttpOpenRequest call 7ff6ed874b20 96->106 107 7ff6ed8ea4f0-7ff6ed8ea602 WinHttpCloseHandle call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 96->107 97->96 162 7ff6ed8ea710-7ff6ed8ea82d WinHttpCloseHandle * 2 call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 106->162 163 7ff6ed8ea82e-7ff6ed8ea868 WinHttpSendRequest 106->163 107->106 162->163 166 7ff6ed8ea86e-7ff6ed8ea87d WinHttpReceiveResponse 163->166 167 7ff6ed8ea9d8-7ff6ed8eab00 WinHttpCloseHandle * 3 call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 163->167 166->167 168 7ff6ed8ea883-7ff6ed8ea8cc WinHttpQueryHeaders 166->168 177 7ff6ed8eab01-7ff6ed8eab34 call 7ff6ed872b20 call 7ff6ed8d4b10 167->177 172 7ff6ed8ea8d2-7ff6ed8ea8db GetLastError 168->172 173 7ff6ed8ea9d3 168->173 172->173 176 7ff6ed8ea8e1-7ff6ed8ea8e6 172->176 173->177 176->173 180 7ff6ed8ea8ec-7ff6ed8ea97d call 7ff6ed872600 call 7ff6ed88e190 call 7ff6ed88dc30 call 7ff6ed884d70 WinHttpQueryHeaders call 7ff6ed88e190 176->180 198 7ff6ed8eacc3-7ff6ed8eaceb call 7ff6ed872790 call 7ff6ed8d8bf0 177->198 199 7ff6ed8eab3a-7ff6ed8eabb9 call 7ff6ed86e380 call 7ff6ed8d49d0 call 7ff6ed8d8100 call 7ff6ed8d9b60 call 7ff6ed8eee70 177->199 237 7ff6ed8ea9c5-7ff6ed8ea9d2 call 7ff6ed875200 180->237 238 7ff6ed8ea97f-7ff6ed8ea9c4 call 7ff6ed8d4e20 call 7ff6ed8d84e0 call 7ff6ed8b6a70 180->238 220 7ff6ed8ead11-7ff6ed8ead1d 198->220 221 7ff6ed8eaced-7ff6ed8ead10 call 7ff6ed8bf060 198->221 199->198 261 7ff6ed8eabbf-7ff6ed8eacc2 WinHttpCloseHandle * 3 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc30 call 7ff6eda84230 call 7ff6ed874b20 * 2 199->261 227 7ff6ed8ead22-7ff6ed8ead34 call 7ff6ed8d9700 220->227 221->220 245 7ff6ed8ead3a-7ff6ed8ead54 WinHttpQueryDataAvailable 227->245 246 7ff6ed8eb07b-7ff6ed8eb085 227->246 237->173 238->237 252 7ff6ed8eae61-7ff6ed8eae66 245->252 253 7ff6ed8ead5a-7ff6ed8eae60 call 7ff6ed8725a0 call 7ff6ed8ba140 GetLastError call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8bdc80 call 7ff6eda84230 call 7ff6ed874b20 * 2 245->253 250 7ff6ed8eb095-7ff6ed8eb182 WinHttpCloseHandle * 3 call 7ff6ed8752d0 call 7ff6ed8d9b60 call 7ff6ed89aef0 call 7ff6ed874b20 * 2 call 7ff6ed8d79d0 call 7ff6ed8d77a0 call 7ff6ed874b20 call 7ff6ed875200 * 3 call 7ff6ed8752d0 * 2 246->250 251 7ff6ed8eb087-7ff6ed8eb094 call 7ff6ed8e6d40 246->251 251->250 259 7ff6ed8eae72-7ff6ed8eaef4 call 7ff6ed89d660 call 7ff6ed8f3390 call 7ff6ed8f3440 call 7ff6ed8f59c0 call 7ff6ed8843e0 WinHttpReadData 252->259 260 7ff6ed8eae68-7ff6ed8eae6d 252->260 253->252 308 7ff6ed8eb06f-7ff6ed8eb074 259->308 309 7ff6ed8eaefa-7ff6ed8eaf04 259->309 260->246 261->198 308->246 313 7ff6ed8eafa0-7ff6ed8eb076 call 7ff6ed872600 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6ed8caa70 call 7ff6ed884d70 call 7ff6ed8f7d00 call 7ff6ed875200 309->313 314 7ff6ed8eaf0a-7ff6ed8eaf5b call 7ff6ed8843e0 call 7ff6ed8f7d00 call 7ff6ed8d8bf0 309->314 313->227 314->313 342 7ff6ed8eaf5d-7ff6ed8eaf66 314->342 342->313 345 7ff6ed8eaf68-7ff6ed8eaf9f call 7ff6ed8d9670 342->345 345->313
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Http$CloseHandle$Concurrency::details::EmptyErrorLastQueue::StructuredWork$shared_ptr$Query$Concurrency::details::_CriticalDataHeadersLock::_OpenReentrantRequestScoped_lockScoped_lock::~_type_info::_name_internal_method$AvailableChar_traitsConnectDecorator::getExceptionFileHeaderListRaiseReadReceiveResponseSafeSendTableTimeoutsType
                                                                                                                                                                                                  • String ID: GET$URL format is not valid : %ws$WinHTTP 1.0$^(https?://(?:www.)?([^/]+))(/.*)?$$file creation failure$handle connection failure$handle initialization failure$handle request creation failure$handle request or response failure$query data not available$timeout init failure
                                                                                                                                                                                                  • API String ID: 5397687-202491335
                                                                                                                                                                                                  • Opcode ID: d2beb36342d35bada47ea085ebca2ccd769675ce4292ebbcd9af8175eec80426
                                                                                                                                                                                                  • Instruction ID: 12b6077262aab869589111ede0875c71ead0f78daf541278f87c852ce9f635a7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d2beb36342d35bada47ea085ebca2ccd769675ce4292ebbcd9af8175eec80426
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 79A2F53261DAC295EA70AB14E8903EFB364FBC5740F405132D68D83BAAEF2ED545CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 2513 7ff6ed8cc810-7ff6ed8cc833 2514 7ff6ed8cc882-7ff6ed8cc8ca call 7ff6ed8cf730 2513->2514 2515 7ff6ed8cc835-7ff6ed8cc87d call 7ff6ed873f10 2513->2515 2521 7ff6ed8cc8d4-7ff6ed8cc901 call 7ff6ed873f10 call 7ff6ed8921a0 * 2 2514->2521 2522 7ff6ed8ccc4c-7ff6ed8ccc53 2515->2522 2529 7ff6ed8cc9ac-7ff6ed8cc9b8 call 7ff6ed8921a0 2521->2529 2530 7ff6ed8cc907-7ff6ed8cc92d LoadLibraryW GetProcAddress 2521->2530 2536 7ff6ed8cc9ba-7ff6ed8cc9d1 call 7ff6ed873f10 2529->2536 2537 7ff6ed8cc9d6-7ff6ed8cca39 call 7ff6ed8d4fc0 call 7ff6ed8f2900 call 7ff6edab3d0c call 7ff6ed86c590 * 2 call 7ff6ed8bea30 2529->2537 2532 7ff6ed8cc92f-7ff6ed8cc945 2530->2532 2533 7ff6ed8cc94a-7ff6ed8cc9a8 call 7ff6ed873f10 2530->2533 2532->2522 2533->2529 2536->2522 2555 7ff6ed8cca42-7ff6ed8cca62 call 7ff6ed8f37e0 2537->2555 2558 7ff6ed8ccc0e-7ff6ed8ccc44 call 7ff6ed86e380 call 7ff6edab3d12 call 7ff6ed875200 call 7ff6ed8d7840 2555->2558 2559 7ff6ed8cca68-7ff6ed8ccad8 call 7ff6ed88e190 call 7ff6ed8789d0 call 7ff6ed884d70 LoadLibraryW call 7ff6ed871660 call 7ff6ed88c470 call 7ff6ed88e190 call 7ff6ed8d8c30 2555->2559 2558->2522 2582 7ff6ed8ccaea-7ff6ed8ccb0e call 7ff6ed86e380 GetProcAddress 2559->2582 2583 7ff6ed8ccada-7ff6ed8ccae5 call 7ff6ed8d78c0 2559->2583 2588 7ff6ed8ccb20-7ff6ed8ccb78 call 7ff6ed8d4fc0 call 7ff6ed8f2900 2582->2588 2589 7ff6ed8ccb10-7ff6ed8ccb1b call 7ff6ed8d78c0 2582->2589 2583->2555 2597 7ff6ed8ccb94-7ff6ed8ccbf2 call 7ff6ed88d750 call 7ff6ed8e8780 call 7ff6ed873f10 call 7ff6ed8d7840 call 7ff6ed8d78c0 call 7ff6ed875200 call 7ff6ed8d7840 2588->2597 2598 7ff6ed8ccb7a-7ff6ed8ccb8f call 7ff6ed8d7840 call 7ff6ed8d78c0 2588->2598 2589->2555 2597->2522 2598->2555
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: atomic$AddressLibraryLoadProc
                                                                                                                                                                                                  • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll$combase.dll
                                                                                                                                                                                                  • API String ID: 1653574484-4170001172
                                                                                                                                                                                                  • Opcode ID: 0f64748a8e10b504b876c25a952559114c949a6b9dddfdb5706a474067a39472
                                                                                                                                                                                                  • Instruction ID: 014894cbee01d17370088b454a038fbc5e2478bc5a361839b68c4983bfe14843
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0f64748a8e10b504b876c25a952559114c949a6b9dddfdb5706a474067a39472
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28B11D3361CA8291D660EB15E4503BFA364FBD4790F804132E69D87BAAFF2ED544CB46

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: GlobalResource$LockName$AllocCreateErrorFindLastLoadNodeNode::SizeofStreamUnlock
                                                                                                                                                                                                  • String ID: &$PNG
                                                                                                                                                                                                  • API String ID: 404809873-3047161795
                                                                                                                                                                                                  • Opcode ID: a81b207330cf8a5697cbf63414b8381410d82245dfc84bfb403a47a84551c8d6
                                                                                                                                                                                                  • Instruction ID: 40f3b87d73efd921a4d791797b88fba56a1ec51da415d291847a6580d4b23ea3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a81b207330cf8a5697cbf63414b8381410d82245dfc84bfb403a47a84551c8d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2B31E976618B8586D7609B15F88432AB7B4FBC8794F104035EA8E87B68EF3ED144CB05

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 3571 7ff6ed87a030-7ff6ed87a263 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed871940 call 7ff6ed91bf80 3616 7ff6ed87a47b-7ff6ed87a485 call 7ff6ed8eecb0 3571->3616 3617 7ff6ed87a269-7ff6ed87a476 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 3 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8fdb80 call 7ff6ed874b20 * 7 call 7ff6ed875200 * 4 3571->3617 3622 7ff6ed87a48b-7ff6ed87a6b3 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 3 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8fdb80 call 7ff6ed874b20 * 7 call 7ff6ed875200 * 4 3616->3622 3623 7ff6ed87a6b8-7ff6ed87a840 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6edab4600 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8da4c0 3616->3623 3757 7ff6ed87abb5-7ff6ed87abbc 3617->3757 3622->3757 3682 7ff6ed87a845-7ff6ed87a869 call 7ff6ed874b20 * 2 3623->3682 3698 7ff6ed87a86b-7ff6ed87a8cd call 7ff6ed874b20 * 3 call 7ff6ed875200 * 4 3682->3698 3699 7ff6ed87a8d2-7ff6ed87abb0 GetLastError FormatMessageW call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed87baf0 call 7ff6ed874b20 call 7ff6ed87c6d0 * 2 call 7ff6ed871880 * 2 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8fdb80 call 7ff6ed874b20 * 7 call 7ff6ed875200 * 4 3682->3699 3698->3757 3699->3757
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$Char_traitsConcurrency::details::_CriticalDecorator::getHandleLock::_ReentrantScoped_lockScoped_lock::~_TableTypetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: .\nwjs\NW_store.exe$.\ui\.$UI StartedMain process ID:%d$creation_error=%ws$directory_switching_error$product$ui_creation_failed$ui_termination_error
                                                                                                                                                                                                  • API String ID: 1646997740-2964731665
                                                                                                                                                                                                  • Opcode ID: 7d7567c6e290a940f4ed94cf07aedb76de9341ee4da2b0406a70c34e54ca74f4
                                                                                                                                                                                                  • Instruction ID: 2bab286f1897155bf43c0d33b6fa30c70879d15c13b96af6155d801ab091635d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7d7567c6e290a940f4ed94cf07aedb76de9341ee4da2b0406a70c34e54ca74f4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F742D43260DAC2A5DA71AB14E4913EFB364EBC5740F801132D68DC3BAAEF2DD645CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1617910340-0
                                                                                                                                                                                                  • Opcode ID: 8b6385eafdf25344f17c9a92ea180dd727e837e9e681b42a0e2fc1af4501a42d
                                                                                                                                                                                                  • Instruction ID: 16a73ce30df6c000c6ec1fd9ee1190e2f58511051cb7d5ac9153d137e932684e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8b6385eafdf25344f17c9a92ea180dd727e837e9e681b42a0e2fc1af4501a42d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B6C1D337B28A4585EB10CFA9C4806AC3761F749BA8F110235DE1E9B7D8EF3AE156C345
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: keybd_event
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2665452162-0
                                                                                                                                                                                                  • Opcode ID: 64687fd2a180e7dcda2dc83caa508bf968030a4a94a22a310129cf98e6860dbe
                                                                                                                                                                                                  • Instruction ID: 500de673b9866be11b75810df2e928123110fd48602ef6487f389ec6d737d5e8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 64687fd2a180e7dcda2dc83caa508bf968030a4a94a22a310129cf98e6860dbe
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0DD0C971B1106342E7B02B61BC6AF950FA06B59BC9FA2B420C9040FB50CD1B12491795

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 360 7ff6ed8880e0-7ff6ed888921 call 7ff6eda834f0 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 511 7ff6ed888a80-7ff6ed888b39 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 360->511 512 7ff6ed888927-7ff6ed8889a8 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8db030 call 7ff6ed874b20 360->512 546 7ff6ed888b40-7ff6ed888c49 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 511->546 529 7ff6ed8889b8-7ff6ed8889bf 512->529 530 7ff6ed8889aa-7ff6ed8889b6 512->530 533 7ff6ed8889c4-7ff6ed888a7b call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 529->533 530->533 533->546 567 7ff6ed888c4f-7ff6ed888d55 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 546->567 568 7ff6ed888d73-7ff6ed888e2c call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 546->568 609 7ff6ed888d5e 567->609 610 7ff6ed888d57-7ff6ed888d5c 567->610 602 7ff6ed888e33-7ff6ed888f3c call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 568->602 619 7ff6ed888f42-7ff6ed889048 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 602->619 620 7ff6ed889066-7ff6ed88911f call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 602->620 613 7ff6ed888d63-7ff6ed888d6e 609->613 610->613 613->602 662 7ff6ed889051 619->662 663 7ff6ed88904a-7ff6ed88904f 619->663 654 7ff6ed889126-7ff6ed88922f call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 620->654 671 7ff6ed889352-7ff6ed88940b call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 654->671 672 7ff6ed889235-7ff6ed88933b call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 654->672 665 7ff6ed889056-7ff6ed889061 662->665 663->665 665->654 705 7ff6ed889412-7ff6ed88951b call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 671->705 714 7ff6ed889346 672->714 715 7ff6ed88933d-7ff6ed889344 672->715 723 7ff6ed889521-7ff6ed889627 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 705->723 724 7ff6ed88964b-7ff6ed889704 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 705->724 716 7ff6ed88934d 714->716 715->716 716->705 765 7ff6ed889633 723->765 766 7ff6ed889629-7ff6ed889631 723->766 757 7ff6ed88970b-7ff6ed889814 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 724->757 775 7ff6ed88993e-7ff6ed8899f7 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 757->775 776 7ff6ed88981a-7ff6ed889920 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 757->776 768 7ff6ed88963b-7ff6ed889646 765->768 766->768 768->757 810 7ff6ed8899fe-7ff6ed889b07 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 775->810 817 7ff6ed889922-7ff6ed889927 776->817 818 7ff6ed889929 776->818 827 7ff6ed889c31-7ff6ed889cea call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 810->827 828 7ff6ed889b0d-7ff6ed889c13 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 810->828 821 7ff6ed88992e-7ff6ed889939 817->821 818->821 821->810 862 7ff6ed889cf1-7ff6ed889dfa call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 827->862 870 7ff6ed889c15-7ff6ed889c1a 828->870 871 7ff6ed889c1c 828->871 879 7ff6ed889e00-7ff6ed889f06 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 862->879 880 7ff6ed889f24-7ff6ed889fdd call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 862->880 873 7ff6ed889c21-7ff6ed889c2c 870->873 871->873 873->862 922 7ff6ed889f0f 879->922 923 7ff6ed889f08-7ff6ed889f0d 879->923 913 7ff6ed889fe4-7ff6ed88a0ed call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 880->913 931 7ff6ed88a0f3-7ff6ed88a1f9 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 913->931 932 7ff6ed88a21d-7ff6ed88a2d6 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 913->932 924 7ff6ed889f14-7ff6ed889f1f 922->924 923->924 924->913 973 7ff6ed88a205 931->973 974 7ff6ed88a1fb-7ff6ed88a203 931->974 965 7ff6ed88a2dd-7ff6ed88a3e6 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 932->965 983 7ff6ed88a510-7ff6ed88a5c9 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 965->983 984 7ff6ed88a3ec-7ff6ed88a4f2 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 965->984 976 7ff6ed88a20d-7ff6ed88a218 973->976 974->976 976->965 1018 7ff6ed88a5d0-7ff6ed88a6d9 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 983->1018 1025 7ff6ed88a4f4-7ff6ed88a4f9 984->1025 1026 7ff6ed88a4fb 984->1026 1035 7ff6ed88a6df-7ff6ed88a7e5 call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 1018->1035 1036 7ff6ed88a803-7ff6ed88a8bc call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 1018->1036 1029 7ff6ed88a500-7ff6ed88a50b 1025->1029 1026->1029 1029->1018 1078 7ff6ed88a7ee 1035->1078 1079 7ff6ed88a7e7-7ff6ed88a7ec 1035->1079 1070 7ff6ed88a8c3-7ff6ed88a9cc call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 1036->1070 1087 7ff6ed88a9d2-7ff6ed88aa53 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8db030 call 7ff6ed874b20 1070->1087 1088 7ff6ed88ab2b-7ff6ed88abe4 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 1070->1088 1081 7ff6ed88a7f3-7ff6ed88a7fe 1078->1081 1079->1081 1081->1070 1105 7ff6ed88aa63-7ff6ed88aa6a 1087->1105 1106 7ff6ed88aa55-7ff6ed88aa61 1087->1106 1122 7ff6ed88abeb-7ff6ed88acf4 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 1088->1122 1109 7ff6ed88aa6f-7ff6ed88ab26 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 1105->1109 1106->1109 1109->1122 1143 7ff6ed88ae00-7ff6ed88aeb8 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 1122->1143 1144 7ff6ed88acfa-7ff6ed88adfb call 7ff6ed891f70 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876670 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 1122->1144 1178 7ff6ed88aeb9-7ff6ed88af95 call 7ff6ed874b20 * 2 call 7ff6ed875200 * 13 1143->1178 1144->1178
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2B77
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2BC2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2BD1
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED888B17
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8DB030: std::ios_base::good.LIBCPMTD ref: 00007FF6ED8DB211
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED888A59
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED888E0A
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8890FD
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8893E9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2BFD
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8899D5
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED889CC8
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED889FBB
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88A2B4
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88A5A7
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88A89A
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88AB04
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88ABC2
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8896E2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED876670: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED87669B
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED876670: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8766AA
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED88AE97
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: type_info::_name_internal_method$Concurrency::details::EmptyQueue::StructuredWork$shared_ptr$Close$Char_traitsCreateQueryValuestd::ios_base::good
                                                                                                                                                                                                  • String ID: PCAppStore$PCAppStoreUpdater$auto_start_on$browser_activity$browser_search$btn_x_close$contextual_offers$hardware_collecting$link_substitution$periodical_offers$personilized_notifications$search_menu$should_auto_update$software_collecting$start_menu_on
                                                                                                                                                                                                  • API String ID: 2434849288-4189071652
                                                                                                                                                                                                  • Opcode ID: fb02c8a0c90e029caf88ce6789e3344be0cc8a29c9e764e7620c00dffe82e491
                                                                                                                                                                                                  • Instruction ID: f7f986235cf88e64dd93608f87b642191bccea8cc5be5fc1a17714beeed4c8c5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fb02c8a0c90e029caf88ce6789e3344be0cc8a29c9e764e7620c00dffe82e491
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8033D33660EAC194EA70AB10E8913EFB3A4FBC5740F405136D68D87BAAEF2DD544CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 1212 7ff6ed87c9d0-7ff6ed87cadb call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 call 7ff6ed874b20 RegisterClassExW 1225 7ff6ed87caed-7ff6ed87cbe8 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 CreateWindowExW call 7ff6ed874b20 1212->1225 1226 7ff6ed87cadd-7ff6ed87cae8 call 7ff6ed874b20 1212->1226 1238 7ff6ed87cbfa-7ff6ed87ce5a ShowWindow call 7ff6eda82de6 call 7ff6ed872600 call 7ff6ed88e190 call 7ff6ed88dc30 call 7ff6ed872600 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed877050 call 7ff6ed876f80 call 7ff6ed874b20 * 3 1225->1238 1239 7ff6ed87cbea-7ff6ed87cbf5 call 7ff6ed874b20 1225->1239 1231 7ff6ed87d8db-7ff6ed87d8e3 1226->1231 1278 7ff6ed87ce5b-7ff6ed87ce6c 1238->1278 1239->1231 1279 7ff6ed87d878-7ff6ed87d8da call 7ff6eda82dec call 7ff6ed874b20 * 3 call 7ff6ed875200 * 2 call 7ff6ed874b20 1278->1279 1280 7ff6ed87ce72-7ff6ed87ced3 call 7ff6ed8766f0 GetForegroundWindow call 7ff6ed884d70 GetWindowTextW call 7ff6ed887c50 1278->1280 1279->1231 1293 7ff6ed87ced5-7ff6ed87ceee call 7ff6ed887c50 1280->1293 1294 7ff6ed87cf02-7ff6ed87cf2c PeekMessageW 1280->1294 1293->1294 1306 7ff6ed87cef0-7ff6ed87cef9 1293->1306 1297 7ff6ed87cf32-7ff6ed87cf5a TranslateMessage DispatchMessageW 1294->1297 1298 7ff6ed87d6c1-7ff6ed87d6cc SleepEx 1294->1298 1302 7ff6ed87d30d-7ff6ed87d318 1297->1302 1303 7ff6ed87cf60-7ff6ed87d308 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 5 call 7ff6ed88ef80 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8856a0 call 7ff6ed874b20 * 5 1297->1303 1301 7ff6ed87d6cd-7ff6ed87d6d6 1298->1301 1307 7ff6ed87d6d8 1301->1307 1308 7ff6ed87d6f1-7ff6ed87d71c call 7ff6ed86e380 OpenEventW 1301->1308 1309 7ff6ed87d6bf 1302->1309 1310 7ff6ed87d31e-7ff6ed87d6be call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 5 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8856a0 call 7ff6ed874b20 * 5 1302->1310 1303->1309 1306->1294 1313 7ff6ed87cefb 1306->1313 1314 7ff6ed87d6d8 call 7ff6ed8db3a0 1307->1314 1323 7ff6ed87d873 1308->1323 1324 7ff6ed87d722-7ff6ed87d734 WaitForSingleObject 1308->1324 1309->1301 1310->1309 1313->1294 1320 7ff6ed87d6dd-7ff6ed87d6e2 1314->1320 1326 7ff6ed87d6ea 1320->1326 1327 7ff6ed87d6e4 call 7ff6ed8f5960 1320->1327 1323->1278 1324->1323 1330 7ff6ed87d73a-7ff6ed87d872 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed90e3c0 CloseHandle call 7ff6ed875200 1324->1330 1326->1308 1336 7ff6ed87d6e9 1327->1336 1330->1323 1336->1326
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • RegisterClassExW.USER32 ref: 00007FF6ED87CAD0
                                                                                                                                                                                                  • CreateWindowExW.USER32 ref: 00007FF6ED87CBBB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsClassCreateRegisterWindowtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: ENDING_EVT_HANDLER$Local$P$PCAppStore$Windows Default Lock Screen$logoff$msg=logoff$msg=shutdown$product$product$shutdown$system_event$system_event${"app":{"menu_search":{"search_request":"", "page":"b"},"show_window": "menu_search"}}
                                                                                                                                                                                                  • API String ID: 331722943-4236414880
                                                                                                                                                                                                  • Opcode ID: 60571e007524dff60455c9e6684670b1d06a14863dae9d56261348af2551f4cf
                                                                                                                                                                                                  • Instruction ID: df42d8a37ee29205b0404f2a13ba892e3307eb701d57e6bde069e3288117f45b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 60571e007524dff60455c9e6684670b1d06a14863dae9d56261348af2551f4cf
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6672F57660DAC2A5DA709B15E8903EFB3A8FBC4740F405132D68D83BA9EF2DD644CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 1467 7ff6ed87db30-7ff6ed87dfb8 call 7ff6eda834f0 call 7ff6ed88bc90 call 7ff6ed88ef80 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871940 call 7ff6ed8daee0 call 7ff6ed86e380 * 2 call 7ff6ed87baf0 call 7ff6ed874b20 call 7ff6ed871880 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fd260 call 7ff6ed874b20 * 4 call 7ff6ed8692c0 call 7ff6ed886440 call 7ff6ed87a030 1548 7ff6ed87e0a9-7ff6ed87e0b8 call 7ff6ed8f3740 call 7ff6ed88cca0 1467->1548 1549 7ff6ed87dfbe-7ff6ed87e0a4 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8856a0 call 7ff6ed874b20 call 7ff6ed876440 call 7ff6ed874b20 * 2 call 7ff6ed875200 call 7ff6ed874b20 * 5 1467->1549 1558 7ff6ed87e0b9-7ff6ed87e0cc call 7ff6ed90eb70 1548->1558 1637 7ff6ed87fb92-7ff6ed87fb99 1549->1637 1565 7ff6ed87e2e3-7ff6ed87e30e call 7ff6ed88e850 call 7ff6ed88b350 call 7ff6ed88cca0 1558->1565 1566 7ff6ed87e0d2-7ff6ed87e0e3 1558->1566 1587 7ff6ed87e313-7ff6ed87e326 call 7ff6ed90db00 1565->1587 1566->1565 1569 7ff6ed87e0e9-7ff6ed87e131 call 7ff6ed88cca0 call 7ff6ed86ae10 call 7ff6ed86a310 call 7ff6ed885f70 1566->1569 1594 7ff6ed87e137-7ff6ed87e2ac call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed884eb0 call 7ff6ed874b20 call 7ff6ed8f3740 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8856a0 call 7ff6ed874b20 call 7ff6ed88d7b0 call 7ff6ed876440 call 7ff6ed874b20 * 2 call 7ff6ed875200 call 7ff6ed874b20 * 5 1569->1594 1595 7ff6ed87e2b1-7ff6ed87e2d8 call 7ff6ed90dbc0 call 7ff6ed8795e0 call 7ff6ed871210 1569->1595 1597 7ff6ed87e32c-7ff6ed87e33d 1587->1597 1598 7ff6ed87e52b-7ff6ed87e809 call 7ff6ed871660 call 7ff6ed869da0 call 7ff6eda4f7a0 call 7ff6ed871660 call 7ff6ed869ba0 call 7ff6eda4f770 call 7ff6eda4f9f0 call 7ff6ed871880 * 3 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fd260 call 7ff6ed874b20 * 5 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed90e3c0 1587->1598 1594->1637 1625 7ff6ed87e2dd-7ff6ed87e2de 1595->1625 1597->1598 1603 7ff6ed87e343-7ff6ed87e38b call 7ff6ed88cca0 call 7ff6ed86ae10 call 7ff6ed86a310 call 7ff6ed885f70 1597->1603 1749 7ff6ed87e80b-7ff6ed87e874 call 7ff6ed876440 call 7ff6ed874b20 * 2 call 7ff6ed875200 call 7ff6ed874b20 * 5 1598->1749 1750 7ff6ed87e879-7ff6ed87ee0f call 7ff6ed86e380 call 7ff6ed8a1c30 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6ed8a34e0 call 7ff6ed86c590 call 7ff6ed92a8f0 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6ed90a8a0 call 7ff6ed86c590 call 7ff6ed92a8f0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6ed9105c0 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6ed9140f0 call 7ff6ed86c590 call 7ff6ed92a990 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6ed919410 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6ed91a3f0 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6ed9207c0 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6ed92f2b0 call 7ff6ed86c590 call 7ff6ed92a990 call 7ff6ed875d60 1598->1750 1642 7ff6ed87e50b-7ff6ed87e526 call 7ff6ed8795e0 call 7ff6ed871210 1603->1642 1643 7ff6ed87e391-7ff6ed87e506 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed884eb0 call 7ff6ed874b20 call 7ff6ed8f3740 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8856a0 call 7ff6ed874b20 call 7ff6ed88d7b0 call 7ff6ed876440 call 7ff6ed874b20 * 2 call 7ff6ed875200 call 7ff6ed874b20 * 5 1603->1643 1625->1558 1642->1587 1643->1637 1749->1637 1869 7ff6ed87ee24-7ff6ed87ee70 call 7ff6ed86e380 * 2 call 7ff6eda1fd50 1750->1869 1870 7ff6ed87ee11-7ff6ed87ee1f call 7ff6ed88b990 1750->1870 1881 7ff6ed87ee75-7ff6ed87eec5 call 7ff6ed86c590 call 7ff6ed92a8f0 call 7ff6ed875d60 1869->1881 1875 7ff6ed87eec6-7ff6ed87f269 call 7ff6ed86e380 * 2 call 7ff6eda1d570 call 7ff6ed86c590 call 7ff6ed92a8f0 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6eda24a50 call 7ff6ed86c590 call 7ff6ed92a990 call 7ff6ed875d60 call 7ff6ed86e380 * 2 call 7ff6eda32da0 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6eda359c0 call 7ff6ed86c590 call 7ff6ed92aae0 call 7ff6ed875d60 call 7ff6ed86e380 call 7ff6ed92b3b0 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6eda346a0 call 7ff6ed8692c0 call 7ff6ed886440 call 7ff6ed8692c0 1870->1875 1953 7ff6ed87f26e-7ff6ed87f34a call 7ff6ed886440 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed90e3c0 WaitForSingleObject 1875->1953 1881->1875 1962 7ff6ed87fa9c-7ff6ed87faef call 7ff6ed90dc50 call 7ff6ed8f3740 call 7ff6ed887e30 ResetEvent 1953->1962 1963 7ff6ed87f350-7ff6ed87f36c WaitForSingleObject 1953->1963 1977 7ff6ed87faf1-7ff6ed87fafe call 7ff6ed88d7b0 1962->1977 1978 7ff6ed87faff-7ff6ed87fb91 call 7ff6ed876440 * 2 call 7ff6ed875200 call 7ff6ed876440 call 7ff6ed874b20 * 2 call 7ff6ed875200 call 7ff6ed874b20 * 5 1962->1978 1964 7ff6ed87fa77-7ff6ed87fa9b CloseHandle * 2 1963->1964 1965 7ff6ed87f372-7ff6ed87f610 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed871880 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fd3b0 call 7ff6ed91bf80 1963->1965 1964->1962 2032 7ff6ed87f837-7ff6ed87f83c 1965->2032 2033 7ff6ed87f616-7ff6ed87f832 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed871880 * 3 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 5 call 7ff6ed875200 1965->2033 1977->1978 1978->1637 2034 7ff6ed87f842-7ff6ed87fa5d call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed871880 * 3 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 5 call 7ff6ed875200 2032->2034 2035 7ff6ed87fa5e-7ff6ed87fa76 call 7ff6ed875200 call 7ff6ed874b20 2032->2035 2033->2035 2034->2035 2035->1964
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$Cpp_errorDecorator::getNameTableThrow_Typestd::_$Char_traitsCloseDefaultFileLanguageLocaleModuleOpenThrd_detachUserValuetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: prnt=%ws&sys_lang=%ws$product$product$started$ui_closing_failed$ui_closing_timeout$ui_creation_error$ui_not_found$waiting_for_UI_connection$waiting_for_windows_creation$windows_created${"app" : {"show_window":"main"}}${"app": {"init": {"userInit": true}}}
                                                                                                                                                                                                  • API String ID: 2904651881-622979156
                                                                                                                                                                                                  • Opcode ID: 7f6d1af957f53883542f57aa5cad78224bfdd2639b2ad6e4cf6dacbb769eaabf
                                                                                                                                                                                                  • Instruction ID: 8fbd2dda44e0b39b1dd3c19f04fcba7dc80fef7b6008344960c62d021094516e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7f6d1af957f53883542f57aa5cad78224bfdd2639b2ad6e4cf6dacbb769eaabf
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 17F2173661EAC194DA70EB15E8913EFA3A4FBC4780F401132D68DC7BAAEE2DD544CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 2116 7ff6eda23480-7ff6eda23978 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8727f0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2c50 call 7ff6ed86e380 call 7ff6eda895a0 2203 7ff6eda2398b-7ff6eda23992 2116->2203 2204 7ff6eda2397a-7ff6eda23989 2116->2204 2205 7ff6eda2399a-7ff6eda23b8d call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed87bdd0 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 * 2 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2c50 call 7ff6ed86e380 call 7ff6eda895a0 2203->2205 2204->2205 2238 7ff6eda23b99 2205->2238 2239 7ff6eda23b8f-7ff6eda23b97 2205->2239 2240 7ff6eda23ba1-7ff6eda23ce5 call 7ff6ed874b20 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2c50 call 7ff6ed86e380 call 7ff6eda895a0 2238->2240 2239->2240 2257 7ff6eda23ce7-7ff6eda23cef 2240->2257 2258 7ff6eda23cf1 2240->2258 2259 7ff6eda23cf9-7ff6eda23e3d call 7ff6ed874b20 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2c50 call 7ff6ed86e380 call 7ff6eda895a0 2257->2259 2258->2259 2276 7ff6eda23e49 2259->2276 2277 7ff6eda23e3f-7ff6eda23e47 2259->2277 2278 7ff6eda23e51-7ff6eda23e6c call 7ff6ed874b20 2276->2278 2277->2278 2281 7ff6eda23e7f-7ff6eda23e86 2278->2281 2282 7ff6eda23e6e-7ff6eda23e7d 2278->2282 2283 7ff6eda23e8e-7ff6eda23f4a call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed87bdd0 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 2281->2283 2282->2283 2300 7ff6eda23f5d-7ff6eda23f64 2283->2300 2301 7ff6eda23f4c-7ff6eda23f5b 2283->2301 2302 7ff6eda23f6c-7ff6eda24028 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed87bdd0 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 2300->2302 2301->2302 2319 7ff6eda2403b-7ff6eda24042 2302->2319 2320 7ff6eda2402a-7ff6eda24039 2302->2320 2321 7ff6eda2404a-7ff6eda2410c call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed87bdd0 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 2319->2321 2320->2321 2338 7ff6eda24439-7ff6eda245ae call 7ff6ed872010 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 call 7ff6ed876b10 call 7ff6ed8768e0 call 7ff6ed891dd0 call 7ff6ed88c470 2321->2338 2339 7ff6eda24112-7ff6eda2432f call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed8f2b40 2321->2339 2380 7ff6eda24645-7ff6eda24656 call 7ff6ed88c470 2338->2380 2381 7ff6eda245b4-7ff6eda245dd call 7ff6ed88c470 2338->2381 2418 7ff6eda24338 2339->2418 2419 7ff6eda24331-7ff6eda24336 2339->2419 2389 7ff6eda2465c-7ff6eda24740 call 7ff6ed86c590 call 7ff6ed887850 call 7ff6ed884cb0 call 7ff6ed876f30 call 7ff6ed869fd0 call 7ff6ed876670 call 7ff6ed875200 2380->2389 2390 7ff6eda24741-7ff6eda24905 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed87bdd0 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed8766f0 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed871940 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6eda21e10 * 2 call 7ff6eda21de0 call 7ff6eda21e10 call 7ff6ed86a7e0 call 7ff6eda21e10 call 7ff6ed874b20 2380->2390 2391 7ff6eda245ec-7ff6eda245f9 2381->2391 2389->2390 2482 7ff6eda24907-7ff6eda2490f 2390->2482 2483 7ff6eda24911 2390->2483 2395 7ff6eda245fb-7ff6eda2463e call 7ff6ed884cb0 call 7ff6ed88b7a0 2391->2395 2396 7ff6eda24640 2391->2396 2395->2391 2396->2390 2422 7ff6eda2433d-7ff6eda24344 2418->2422 2419->2422 2425 7ff6eda24357-7ff6eda2435e 2422->2425 2426 7ff6eda24346-7ff6eda24355 2422->2426 2429 7ff6eda24366-7ff6eda24438 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed876cd0 call 7ff6ed876790 call 7ff6ed875200 call 7ff6ed874b20 call 7ff6ed875200 * 2 2425->2429 2426->2429 2429->2338 2484 7ff6eda24919-7ff6eda24a42 call 7ff6ed912ed0 call 7ff6ed8717c0 call 7ff6ed90e3c0 call 7ff6ed874b20 call 7ff6ed875200 call 7ff6ed878aa0 call 7ff6ed875350 call 7ff6ed875200 * 7 2482->2484 2483->2484
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2CA0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: strrchr.LIBCMTD ref: 00007FF6ED8F2CB7
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2D03
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCloseKey.KERNEL32 ref: 00007FF6ED8F2D1D
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6EDA23A2F
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6EDA23F23
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6EDA24001
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6EDA243FB
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6EDA240DF
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2B77
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2BC2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2BD1
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6EDA24879
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6EDA24888
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6EDA248A5
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6EDA248B4
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6EDA248D0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: type_info::_name_internal_method$Decorator::getTableType$Concurrency::details::EmptyQueue::StructuredWork$CloseCreateQueryValue$Char_traitsshared_ptrstrrchr
                                                                                                                                                                                                  • String ID: ColorPrevalence$ColorizationColor$EnableTransparency$Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced$Software\Microsoft\Windows\CurrentVersion\Themes\Personalize$Software\Microsoft\Windows\DWM$SystemUsesLightTheme$TaskbarAl$theme_parameter${"app" : {
                                                                                                                                                                                                  • API String ID: 3722789660-4154301006
                                                                                                                                                                                                  • Opcode ID: 629e4180bd4695e851ea739aa3e90b51659bc523c6b549485e7ec389befb541d
                                                                                                                                                                                                  • Instruction ID: 2457c8de3cdda9025442c42b5a7a60f0e5f5e1f363898cf49bce4c8d04e860fb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 629e4180bd4695e851ea739aa3e90b51659bc523c6b549485e7ec389befb541d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F2B2D23260EAC1A4DAB09B15E8903EFB3A4EBC5744F405136DA8D83BA9EF3DD544CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 2617 7ff6eda24a50-7ff6eda24a76 2618 7ff6eda24a87-7ff6eda24aa7 call 7ff6ed9090b0 2617->2618 2619 7ff6eda24a78-7ff6eda24a85 2617->2619 2624 7ff6eda2564b-7ff6eda25652 2618->2624 2619->2618 2620 7ff6eda24aac-7ff6eda24d47 call 7ff6eda23480 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 CreateEventW call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 2619->2620 2666 7ff6eda24d4d-7ff6eda24f23 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed871660 call 7ff6eda20830 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6eda20a50 call 7ff6ed874b20 * 3 2620->2666 2667 7ff6eda24f24-7ff6eda25539 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed871660 call 7ff6eda20870 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6eda20a50 call 7ff6ed874b20 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed871660 call 7ff6eda208b0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6eda20a50 call 7ff6ed874b20 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed871660 call 7ff6eda207f0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6eda20a50 call 7ff6ed874b20 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed871660 call 7ff6eda207b0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6eda20a50 2620->2667 2666->2667 2759 7ff6eda2553e-7ff6eda25643 call 7ff6ed874b20 * 2 call 7ff6ed892d60 call 7ff6ed871660 call 7ff6eda206f0 call 7ff6ed908fd0 call 7ff6ed875d60 call 7ff6ed874b20 * 8 2667->2759 2759->2624
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateEventW.KERNEL32 ref: 00007FF6EDA24B64
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA24E27
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA20A50: CreateEventW.KERNEL32 ref: 00007FF6EDA20A78
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA24FBF
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA2514F
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA252DC
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA25469
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA25590
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA206F0: shared_ptr.LIBCMTD ref: 00007FF6EDA20763
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_SchedulerScheduler::_$shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$CreateEvent$Char_traitstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: ClosingEvent$ColorPrevalence$ColorizationColor$EnableTransparency$Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced$Software\Microsoft\Windows\CurrentVersion\Themes\Personalize$Software\Microsoft\Windows\DWM$SystemUsesLightTheme$TaskbarAl
                                                                                                                                                                                                  • API String ID: 2878102572-2470191940
                                                                                                                                                                                                  • Opcode ID: 4fa548c000609a0dedebb272ed7f61c0ac2d976bbcd6a5a41ff251a65c92c1a6
                                                                                                                                                                                                  • Instruction ID: dd8d3847445e06d440db224e6f908a38797912db870af789b87be30a82e93399
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4fa548c000609a0dedebb272ed7f61c0ac2d976bbcd6a5a41ff251a65c92c1a6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1252CF76609BC195DAB19B15E4903DFB3A8FBC8780F401126DACD83BA9EF2DD644CB44

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Decorator::getTableType$QueryValue$Globalwsprintf$AllocFree
                                                                                                                                                                                                  • String ID: \StringFileInfo\%04x%04x\FileDescription$\StringFileInfo\%04x%04x\ProductVersion$\VarFileInfo\Translation
                                                                                                                                                                                                  • API String ID: 3623593157-227869778
                                                                                                                                                                                                  • Opcode ID: 5245a938e7b1c834599d437fe00786720598b7f84d0f842edb5c5c3dab090373
                                                                                                                                                                                                  • Instruction ID: 3a2f55e6f0b6982851f9c4613e951c118b443660d3a837e76d6f440b189f4e22
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5245a938e7b1c834599d437fe00786720598b7f84d0f842edb5c5c3dab090373
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F8515437718A4681DB60DB19E4553BAB7A0FBC4784F401132EA8E877A9EF3ED645CB04

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 2821 7ff6eda40980-7ff6eda40ce2 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6eda3d330 call 7ff6ed8f9120 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 call 7ff6ed872b20 call 7ff6eda48070 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 2878 7ff6eda40ce8-7ff6eda40dcf call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda48560 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 2821->2878 2879 7ff6eda40dd0-7ff6eda40eb9 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 2821->2879 2878->2879 2912 7ff6eda40fa7-7ff6eda40ff2 call 7ff6ed8843e0 call 7ff6ed884430 2879->2912 2913 7ff6eda40ebf-7ff6eda40fa6 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda48560 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 2879->2913 2925 7ff6eda40ff8-7ff6eda410e8 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 2912->2925 2926 7ff6eda412b3-7ff6eda412c2 call 7ff6ed8a0dd0 2912->2926 2913->2912 2984 7ff6eda412ae 2925->2984 2985 7ff6eda410ee-7ff6eda411a3 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda47ab0 2925->2985 2933 7ff6eda412c8-7ff6eda418db call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6eda3bd20 call 7ff6ed8d3bc0 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6eda3bfa0 call 7ff6ed89d010 call 7ff6eda3b960 call 7ff6eda486d0 call 7ff6ed871940 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6eda35cc0 call 7ff6ed89e0a0 call 7ff6ed884d50 call 7ff6ed871820 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 call 7ff6ed87baf0 call 7ff6ed874b20 * 2 call 7ff6ed8751d0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fd260 call 7ff6ed874b20 * 4 call 7ff6ed89ac70 call 7ff6ed874b20 * 6 2926->2933 2934 7ff6eda418dc-7ff6eda41952 call 7ff6eda3cc90 call 7ff6eda3cc70 call 7ff6ed89abc0 call 7ff6ed8751d0 * 5 2926->2934 2933->2934 2984->2926 3008 7ff6eda411a8-7ff6eda412ad call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6ed8a0e70 call 7ff6eda3bba0 call 7ff6eda3cc70 2985->3008 3008->2984
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9E53
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9EDC
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8F9160
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: std::_Is_slash_oper::operator.LIBCPMTD ref: 00007FF6ED8F91B2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8F91E2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: std::_Is_slash_oper::operator.LIBCPMTD ref: 00007FF6ED8F9257
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA48070: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA48184
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6EDA40FB9
                                                                                                                                                                                                  • HandleT.LIBCPMTD ref: 00007FF6EDA40FC8
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$shared_ptr$Is_slash_oper::operatorstd::_$Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_char_traitstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: /p.gif$Default$Extensions$Guest Profile$Microsoft\Edge\User Data$Secure Preferences$data=%ws$ev.pcapp.store$ext_edge$pcdetails
                                                                                                                                                                                                  • API String ID: 9541410-4110900778
                                                                                                                                                                                                  • Opcode ID: 483af435c5baa49c66b92d91e248382de6b183502b725584244540e16fdfe424
                                                                                                                                                                                                  • Instruction ID: de483268e79ff4ab000da694d0a79a1dd42868c9ae19ed82c7d77c1b305de644
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 483af435c5baa49c66b92d91e248382de6b183502b725584244540e16fdfe424
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F82F63260DAC6A5DAB09B14E8903EFB365FBC4740F405132D6CC83BAAEE2DD645CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 3105 7ff6eda3f9a0-7ff6eda3fd02 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872330 call 7ff6ed8ba340 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6eda3d330 call 7ff6ed8f9120 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 call 7ff6ed872b20 call 7ff6eda48070 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 3162 7ff6eda3fd08-7ff6eda3fdef call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda48560 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 3105->3162 3163 7ff6eda3fdf0-7ff6eda3fed9 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 3105->3163 3162->3163 3196 7ff6eda3ffc7-7ff6eda40012 call 7ff6ed8843e0 call 7ff6ed884430 3163->3196 3197 7ff6eda3fedf-7ff6eda3ffc6 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda48560 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 3163->3197 3209 7ff6eda40018-7ff6eda40108 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6ed8ec7b0 call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 3196->3209 3210 7ff6eda402d3-7ff6eda402e2 call 7ff6ed8a0dd0 3196->3210 3197->3196 3269 7ff6eda402ce 3209->3269 3270 7ff6eda4010e-7ff6eda401c3 call 7ff6ed872290 call 7ff6ed8b9e20 call 7ff6ed900120 call 7ff6ed8f9120 call 7ff6eda47ab0 3209->3270 3217 7ff6eda402e8-7ff6eda408fb call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6eda3bd20 call 7ff6ed8d3bc0 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6eda3bfa0 call 7ff6ed89d010 call 7ff6eda3b960 call 7ff6eda486d0 call 7ff6ed871940 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6eda35cc0 call 7ff6ed89e0a0 call 7ff6ed884d50 call 7ff6ed871820 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed86e380 call 7ff6ed87baf0 call 7ff6ed874b20 * 2 call 7ff6ed8751d0 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fd260 call 7ff6ed874b20 * 4 call 7ff6ed89ac70 call 7ff6ed874b20 * 6 3210->3217 3218 7ff6eda408fc-7ff6eda40972 call 7ff6eda3cc90 call 7ff6eda3cc70 call 7ff6ed89abc0 call 7ff6ed8751d0 * 5 3210->3218 3217->3218 3269->3210 3292 7ff6eda401c8-7ff6eda402cd call 7ff6ed89abc0 * 2 call 7ff6ed8751d0 call 7ff6ed8a0e70 call 7ff6ed89d010 call 7ff6ed8a0e70 call 7ff6eda3bba0 call 7ff6eda3cc70 3270->3292 3292->3269
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9E53
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9EDC
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8F9160
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: std::_Is_slash_oper::operator.LIBCPMTD ref: 00007FF6ED8F91B2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8F91E2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F9120: std::_Is_slash_oper::operator.LIBCPMTD ref: 00007FF6ED8F9257
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA48070: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA48184
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6EDA3FFD9
                                                                                                                                                                                                  • HandleT.LIBCPMTD ref: 00007FF6EDA3FFE8
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$shared_ptr$Is_slash_oper::operatorstd::_$Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_char_traitstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: /p.gif$Default$Extensions$Google\Chrome\User Data$Guest Profile$Secure Preferences$data=%ws$ev.pcapp.store$ext_chrome$pcdetails
                                                                                                                                                                                                  • API String ID: 9541410-2486191938
                                                                                                                                                                                                  • Opcode ID: 3722b5240b5f6ac89118bbdb6b7832b03a9914558874b31e31ab105012cd6947
                                                                                                                                                                                                  • Instruction ID: 36d200af9a936e375cddd9e96ea9a448e34640a47c721fb88af6f34a203a79c6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3722b5240b5f6ac89118bbdb6b7832b03a9914558874b31e31ab105012cd6947
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A082F63260DAC6A5DAB09B14E8903EFB365FBC5740F405132D6CC83BAAEE2DD645CB45

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 3389 7ff6ed8bc710-7ff6ed8bc74b 3390 7ff6ed8bc751-7ff6ed8bc76a call 7ff6ed8a83f0 3389->3390 3391 7ff6ed8bc7f0-7ff6ed8bc7f2 3389->3391 3395 7ff6ed8bc781-7ff6ed8bc78d 3390->3395 3396 7ff6ed8bc76c-7ff6ed8bc77f 3390->3396 3392 7ff6ed8bcd69-7ff6ed8bcd70 3391->3392 3397 7ff6ed8bc792-7ff6ed8bc7fd call 7ff6ed86e380 WinHttpConnect 3395->3397 3396->3397 3401 7ff6ed8bc803-7ff6ed8bcb5b call 7ff6ed871940 GetTickCount64 call 7ff6ed8a83f0 3397->3401 3402 7ff6ed8bcce9-7ff6ed8bcceb 3397->3402 3407 7ff6ed8bcb7d-7ff6ed8bcb91 call 7ff6ed86e380 3401->3407 3408 7ff6ed8bcb5d-7ff6ed8bcb7b call 7ff6ed86e380 3401->3408 3402->3392 3413 7ff6ed8bcb99-7ff6ed8bcc6f call 7ff6ed86e380 call 7ff6ed87baf0 call 7ff6ed86e380 WinHttpOpenRequest 3407->3413 3408->3413 3420 7ff6ed8bcc71-7ff6ed8bcc97 WinHttpSetTimeouts 3413->3420 3421 7ff6ed8bccdc-7ff6ed8bccf3 call 7ff6ed874b20 3413->3421 3420->3421 3422 7ff6ed8bcc99-7ff6ed8bcc9f 3420->3422 3430 7ff6ed8bcd25-7ff6ed8bcd2a 3421->3430 3431 7ff6ed8bccf5-7ff6ed8bcd21 WinHttpSendRequest 3421->3431 3424 7ff6ed8bcca1-7ff6ed8bccac WinHttpCloseHandle 3422->3424 3425 7ff6ed8bccad-7ff6ed8bccb3 3422->3425 3424->3425 3427 7ff6ed8bccc1-7ff6ed8bccd7 call 7ff6ed874b20 3425->3427 3428 7ff6ed8bccb5-7ff6ed8bccc0 WinHttpCloseHandle 3425->3428 3427->3392 3428->3427 3433 7ff6ed8bcd3d-7ff6ed8bcd43 3430->3433 3434 7ff6ed8bcd2c-7ff6ed8bcd39 WinHttpReceiveResponse 3430->3434 3431->3430 3436 7ff6ed8bcd51-7ff6ed8bcd57 3433->3436 3437 7ff6ed8bcd45-7ff6ed8bcd50 WinHttpCloseHandle 3433->3437 3434->3433 3438 7ff6ed8bcd65 3436->3438 3439 7ff6ed8bcd59-7ff6ed8bcd64 WinHttpCloseHandle 3436->3439 3437->3436 3438->3392 3439->3438
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Http$CloseHandle$Requeststd::ios_base::good$ConnectCount64OpenReceiveResponseSendTickTimeouts
                                                                                                                                                                                                  • String ID: GET
                                                                                                                                                                                                  • API String ID: 2571818228-1805413626
                                                                                                                                                                                                  • Opcode ID: e19742c961e20d7340077f919ee844f5a44ac81aeb8bb9ef1e555be0b3bf5bdc
                                                                                                                                                                                                  • Instruction ID: 14f1082ecf1d4a04134a00838de4a06eddb46bf66ca188c6da7d0c65cbea7066
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e19742c961e20d7340077f919ee844f5a44ac81aeb8bb9ef1e555be0b3bf5bdc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B0F16D36609FC585D6B08B1AF88439BB3A4F788B90F104526DACD87B69EF7DD094CB04

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 3440 7ff6ed87fc30-7ff6ed87fc5a 3441 7ff6ed87fc5c-7ff6ed87fc61 3440->3441 3442 7ff6ed87fc85-7ff6ed87fc8d 3440->3442 3443 7ff6ed87fc67-7ff6ed87fc6c 3441->3443 3444 7ff6ed87fd10 3441->3444 3445 7ff6ed87fd15-7ff6ed87fd1e 3442->3445 3446 7ff6ed87fc93-7ff6ed87fc9b 3442->3446 3452 7ff6ed87fca6 3443->3452 3453 7ff6ed87fc6e-7ff6ed87fc73 3443->3453 3449 7ff6ed8802dc-7ff6ed8802fb DefWindowProcW 3444->3449 3450 7ff6ed87ffcd-7ff6ed87ffd6 3445->3450 3451 7ff6ed87fd24-7ff6ed87ffc8 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 8 3445->3451 3447 7ff6ed88028b-7ff6ed880294 3446->3447 3448 7ff6ed87fca1 3446->3448 3458 7ff6ed8802a8 3447->3458 3459 7ff6ed880296-7ff6ed88029f 3447->3459 3454 7ff6ed8802b5-7ff6ed8802da DefWindowProcW 3448->3454 3455 7ff6ed880301-7ff6ed880308 3449->3455 3456 7ff6ed87ffdc-7ff6ed880288 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed871880 * 2 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8717c0 call 7ff6ed8b9730 call 7ff6ed8fdb80 call 7ff6ed874b20 * 8 3450->3456 3457 7ff6ed880289 3450->3457 3451->3457 3452->3449 3461 7ff6ed8802aa-7ff6ed8802b3 PostQuitMessage 3453->3461 3462 7ff6ed87fc79-7ff6ed87fc7e 3453->3462 3454->3449 3454->3455 3456->3457 3457->3449 3458->3449 3459->3458 3464 7ff6ed8802a1 3459->3464 3461->3449 3466 7ff6ed87fcab-7ff6ed87fcc1 3462->3466 3467 7ff6ed87fc80 3462->3467 3464->3458 3468 7ff6ed87fcc3-7ff6ed87fcdd PostMessageW 3466->3468 3469 7ff6ed87fcdf-7ff6ed87fce8 3466->3469 3467->3454 3472 7ff6ed87fd04-7ff6ed87fd06 3468->3472 3469->3472 3473 7ff6ed87fcea-7ff6ed87fd03 PostMessageW 3469->3473 3472->3455 3473->3472
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessagePostProcWindow$Quit
                                                                                                                                                                                                  • String ID: msg=resume_suspend$msg=suspend$product$product$system_event$system_event
                                                                                                                                                                                                  • API String ID: 3552470998-2520652036
                                                                                                                                                                                                  • Opcode ID: 194fd3e79512a9d3fb692690cfac9c772a9e5c003dc7b1f9a4fb0451a87de95b
                                                                                                                                                                                                  • Instruction ID: afef16a0de5f3f1321604e110929ef210f93796fbdc0db500097c0144919212e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 194fd3e79512a9d3fb692690cfac9c772a9e5c003dc7b1f9a4fb0451a87de95b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FFF1F43760DAC6A5DAB19B14E4903EBB3A4FBC9340F401132D68D83BA9EF6DD544CB05

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 3797 7ff6ed87b070-7ff6ed87b385 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 call 7ff6ed8725a0 call 7ff6ed8ba140 call 7ff6ed86e380 call 7ff6ed8725a0 call 7ff6ed874b20 GetClassNameW 3848 7ff6ed87b3f9-7ff6ed87b462 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6eda895a0 3797->3848 3849 7ff6ed87b387-7ff6ed87b3a4 GetWindowTextW 3797->3849 3866 7ff6ed87b464-7ff6ed87b46c 3848->3866 3867 7ff6ed87b46e 3848->3867 3849->3848 3851 7ff6ed87b3a6-7ff6ed87b3f4 call 7ff6ed875200 * 5 3849->3851 3874 7ff6ed87b9d4-7ff6ed87b9dc 3851->3874 3869 7ff6ed87b476-7ff6ed87b493 call 7ff6ed874b20 3866->3869 3867->3869 3875 7ff6ed87b54d-7ff6ed87b556 3869->3875 3876 7ff6ed87b499-7ff6ed87b50a EnumChildWindows * 3 call 7ff6ed875200 3869->3876 3877 7ff6ed87b55c-7ff6ed87b5dd call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6eda895a0 3875->3877 3878 7ff6ed87b5e3-7ff6ed87b5ea 3875->3878 3881 7ff6ed87b50f-7ff6ed87b548 call 7ff6ed875200 * 4 3876->3881 3877->3878 3930 7ff6ed87b67f 3877->3930 3882 7ff6ed87b675-7ff6ed87b67d 3878->3882 3883 7ff6ed87b5f0-7ff6ed87b600 call 7ff6eda89728 3878->3883 3881->3874 3886 7ff6ed87b687-7ff6ed87b699 3882->3886 3883->3882 3898 7ff6ed87b602-7ff6ed87b673 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6eda895a0 3883->3898 3890 7ff6ed87b69b-7ff6ed87b6ad call 7ff6ed874b20 3886->3890 3891 7ff6ed87b6ae-7ff6ed87b6b7 3886->3891 3890->3891 3896 7ff6ed87b6cc-7ff6ed87b6d3 3891->3896 3897 7ff6ed87b6b9-7ff6ed87b6cb call 7ff6ed874b20 3891->3897 3901 7ff6ed87b737-7ff6ed87b740 3896->3901 3902 7ff6ed87b6d5-7ff6ed87b732 call 7ff6ed875200 * 5 3896->3902 3897->3896 3898->3882 3898->3930 3911 7ff6ed87b7c6 3901->3911 3912 7ff6ed87b746-7ff6ed87b7ba call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6eda895a0 3901->3912 3902->3874 3917 7ff6ed87b7ce-7ff6ed87b7e0 3911->3917 3912->3911 3970 7ff6ed87b7bc-7ff6ed87b7c4 3912->3970 3923 7ff6ed87b7f5-7ff6ed87b7fc 3917->3923 3924 7ff6ed87b7e2-7ff6ed87b7f4 call 7ff6ed874b20 3917->3924 3932 7ff6ed87b860-7ff6ed87b869 3923->3932 3933 7ff6ed87b7fe-7ff6ed87b85b call 7ff6ed875200 * 5 3923->3933 3924->3923 3930->3886 3938 7ff6ed87b8ef 3932->3938 3939 7ff6ed87b86f-7ff6ed87b8e3 call 7ff6ed8724b0 call 7ff6ed8b9ac0 call 7ff6ed86e380 call 7ff6eda895a0 3932->3939 3933->3874 3944 7ff6ed87b8f7-7ff6ed87b909 3938->3944 3939->3938 3987 7ff6ed87b8e5-7ff6ed87b8ed 3939->3987 3950 7ff6ed87b90b-7ff6ed87b91d call 7ff6ed874b20 3944->3950 3951 7ff6ed87b91e-7ff6ed87b925 3944->3951 3950->3951 3957 7ff6ed87b927-7ff6ed87b984 call 7ff6ed875200 * 5 3951->3957 3958 7ff6ed87b986-7ff6ed87b9d0 call 7ff6ed875200 * 5 3951->3958 3957->3874 3958->3874 3970->3917 3987->3944
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ChildEnumWindows$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsClassNameTextWindowshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: =====> %ws FOUND <=====$Shell_TrayWnd$Start$TrayButton$TrayDummySearchControl
                                                                                                                                                                                                  • API String ID: 1535316472-2840285642
                                                                                                                                                                                                  • Opcode ID: 2f7701e577e0dd1833a27274874c1b488cd86a2a0ae7a4cece417ff6d08a2c04
                                                                                                                                                                                                  • Instruction ID: 18b3668b3cae96725f5ae7bf458a878022cb610ef5fa38bd718cf37e7e609bc7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2f7701e577e0dd1833a27274874c1b488cd86a2a0ae7a4cece417ff6d08a2c04
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D532F53261EAC1A5EA70DB14E4503EFB3A4EB84740F801132D69DC7BAAEF2DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED887E30: RegOpenKeyExW.KERNEL32 ref: 00007FF6ED887FAE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED887E30: RegQueryValueExW.KERNEL32 ref: 00007FF6ED888067
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED88BDD1
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED88BE50
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED88BFDF
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED88BEDA
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Decorator::getTableType$shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsOpenQueryValuetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: RESTART$RUNNING$Unknown+state=%d$close_state=%ws$invalid_app_close$product
                                                                                                                                                                                                  • API String ID: 3445494136-3736349495
                                                                                                                                                                                                  • Opcode ID: 36c5f8ab008293e7bc352f01642eeffe3f26d8ecac5e540006d9b4aba3364a7f
                                                                                                                                                                                                  • Instruction ID: a1c392e235d46bbdb416cf23dfefdb0371d1e0cab73766a737ec8a2c8c95a9bc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 36c5f8ab008293e7bc352f01642eeffe3f26d8ecac5e540006d9b4aba3364a7f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AAE1E73661DAC2A5DAB09B14E4913EFB364FBC4740F806132D68D83BAAEF2DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED88CCA0: _Subatomic.LIBCONCRTD ref: 00007FF6ED88CD0E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • CoInitialize.OLE32 ref: 00007FF6ED92C3DC
                                                                                                                                                                                                  • CoCreateInstance.OLE32 ref: 00007FF6ED92C40D
                                                                                                                                                                                                  • shared_ptr.LIBCMTD ref: 00007FF6ED92C443
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED92E910: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED92E98B
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED92E910: HandleT.LIBCPMTD ref: 00007FF6ED92E99A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::details::_CreateCriticalHandleInitializeInstanceLock::_ReentrantScoped_lockScoped_lock::~_Subatomictype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: SearchApp.exe$SearchHost.exe$SearchUI.exe$ShellExperienceHost.exe$StartMenuExperienceHost.exe$explorer.exe
                                                                                                                                                                                                  • API String ID: 1408288539-3335880049
                                                                                                                                                                                                  • Opcode ID: bf6d3be7b8e29bae6622c3c3b634ee1f5fdfdcfa275100c2aa2e5f90c12ffb50
                                                                                                                                                                                                  • Instruction ID: 858529fcc80f9a837f4d2d4aad9fa469177786245fee231d219eaacb96cffd5d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bf6d3be7b8e29bae6622c3c3b634ee1f5fdfdcfa275100c2aa2e5f90c12ffb50
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DCE10436609AC195DAB09B15F4943EBB3A4FBC4784F805132DA8D83BAAEF3DC544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • CoCreateInstance.COMBASE ref: 00007FF6EDA1D8F8
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA19D90: SetLastError.KERNEL32 ref: 00007FF6EDA19DA0
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00007FF6EDA1D912
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6EDA1DA01
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$ErrorLast$Char_traitsConcurrency::details::_CreateInstanceSchedulerScheduler::_shared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: CoCreateInstance+CLSID_AppVisibility+IID_IAppVisibility$CoInitialize+Init+Failed${"app" : {"hide_window": "menu_search"}}${"app" : {"hide_window": "menu_store"}}${"app" : {"menu_store" : {"top":%d,"left":%d,"bottom":%d,"right":%d}}}${"app" : {"show_window": "menu_store","menu_store" : {"top":%d,"left":%d,"bottom":%d,"right":%d}}}
                                                                                                                                                                                                  • API String ID: 2502378382-2706694235
                                                                                                                                                                                                  • Opcode ID: 6927ec11ebe123eac90caa86797e48abfc0da41dfc2a8a71b4332f7ff84300cd
                                                                                                                                                                                                  • Instruction ID: da911d654013acba69bbccc595a359e9464b8631b04985218c9ed52fcd0c5006
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6927ec11ebe123eac90caa86797e48abfc0da41dfc2a8a71b4332f7ff84300cd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DBD11332619AC2A5DA71AB14E8913EFB3A4FBC4740F405132D68D83BAAEF2DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                                                                                                                                  • String ID: bad locale name
                                                                                                                                                                                                  • API String ID: 3904239083-1405518554
                                                                                                                                                                                                  • Opcode ID: 3323f212940f9c4f2f723f0f05cb155bf9520aa6d01271d6f74276b9ccdb5679
                                                                                                                                                                                                  • Instruction ID: 7463230bf295bc42fbc83aae37e1e27eea76d0661eb1dded91bcbb124662189e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3323f212940f9c4f2f723f0f05cb155bf9520aa6d01271d6f74276b9ccdb5679
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34113023B09A4181DD00E759E44176F6365EF83788F501431EA8C93BE6EE3ED4118709
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA36610: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA3662D
                                                                                                                                                                                                  • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FF6EDA47B20
                                                                                                                                                                                                  • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FF6EDA47BBF
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874920: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED874933
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FF6EDA47C25
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9E53
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9EDC
                                                                                                                                                                                                  • allocator.LIBCPMTD ref: 00007FF6EDA47EA7
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F90F0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED8F9108
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA3CE70: Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00007FF6EDA3CE95
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA47F73
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::$EmptyQueue::StructuredWork$Schedulershared_ptr$ProcessorProxyRoot::Virtual$Affinity::operator!=Concurrency::details::_ExceptionFileHardwareHeaderRaiseScheduler::_allocatorchar_traitsstd::runtime_error::runtime_errortype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Could not open file for reading$extensions$settings
                                                                                                                                                                                                  • API String ID: 486076642-1363464879
                                                                                                                                                                                                  • Opcode ID: 3fe239019b7bca3a142188c55fd6e489e6d853db4d34aab577088447549fe5f7
                                                                                                                                                                                                  • Instruction ID: 34d2941989caa68a0ee957da6bd97277af64cbbd888e9b011dd3dca45784a5e8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fe239019b7bca3a142188c55fd6e489e6d853db4d34aab577088447549fe5f7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 63D1CF3260DAC1A4DA70AB14E4913EFB3A5FBC5340F405132D6CD87BAAEE2DD649CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA1E8B0: CoInitializeEx.OLE32 ref: 00007FF6EDA1E920
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED89A400: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED89A41A
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8729E0: _Ptr_base.LIBCMTD ref: 00007FF6ED8729EE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • CreateEventW.KERNEL32 ref: 00007FF6ED8730E8
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED87B040: GetDesktopWindow.USER32 ref: 00007FF6ED87B049
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED87B040: EnumChildWindows.USER32 ref: 00007FF6ED87B05C
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32 ref: 00007FF6ED87328F
                                                                                                                                                                                                  • CreateEventW.KERNEL32 ref: 00007FF6ED87338C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED90C8E0: OpenEventW.KERNEL32 ref: 00007FF6ED90CA06
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED8733F2
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA83130: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6EDA83160
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA83130: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6EDA83166
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::CreateEmptyEventQueue::StructuredWork$Concurrency::cancel_current_task$Char_traitsChildConcurrency::details::_Decorator::getDesktopDirectoryEnumInitializeOpenPtr_baseSchedulerScheduler::_TableTypeWindowWindowsshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: ClosingEvent$DEBUGSCREEN_EVENT$\download
                                                                                                                                                                                                  • API String ID: 3598548489-3079862309
                                                                                                                                                                                                  • Opcode ID: d3b91e15cf6cbeabcdab2fe4cf950cecad0f162f4e9f4832b3a7e04ce29c5de2
                                                                                                                                                                                                  • Instruction ID: adbce55e0784d838cd64489e9b56a06143d22027b601e8ebc2073310866dce50
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d3b91e15cf6cbeabcdab2fe4cf950cecad0f162f4e9f4832b3a7e04ce29c5de2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 09A2F532609FC581EA709B19E8953EFA3A4FB85B81F401435DA8D87B9AEF3DC154CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2CA0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: strrchr.LIBCMTD ref: 00007FF6ED8F2CB7
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2D03
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCloseKey.KERNEL32 ref: 00007FF6ED8F2D1D
                                                                                                                                                                                                  • UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED8E6A3E
                                                                                                                                                                                                  • std::ios_base::good.LIBCPMTD ref: 00007FF6ED8E6A5A
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2B77
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2BC2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2BD1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$CloseCreateQueryValue$Char_traitsDecorator::getTableTypestd::ios_base::goodstrrchrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: %lu$BuildNumber$CurrentBuild$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
                                                                                                                                                                                                  • API String ID: 1851878312-1501554625
                                                                                                                                                                                                  • Opcode ID: d38d18f67ed97948c5b909dc550a6b7d46763812be9cf2cbcf621f2ff9e16f03
                                                                                                                                                                                                  • Instruction ID: 3de08b49ed3bafac85d69c3703a6d4f7b3bc3cfa26f73e69868b0dbb4ee01445
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d38d18f67ed97948c5b909dc550a6b7d46763812be9cf2cbcf621f2ff9e16f03
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1A1B23661DAC1A4DA709B15E4913EBB3A4FBC4780F405132EACD83BAAEE2DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32 ref: 00007FF6ED88F086
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • RegOpenKeyExW.KERNEL32 ref: 00007FF6ED88F101
                                                                                                                                                                                                  • RegSetValueExW.KERNEL32 ref: 00007FF6ED88F15A
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32 ref: 00007FF6ED88F17E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsCloseFileModuleNameOpenValueshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: PCAppStore$Software\PCAppStore$status
                                                                                                                                                                                                  • API String ID: 2919119571-3586994989
                                                                                                                                                                                                  • Opcode ID: 78db1b1bd5ebe562c630f547080e048499d2bc996eec7fd59a7917e005e1c090
                                                                                                                                                                                                  • Instruction ID: 58811464e3452124f45ae2ab9f55b1f011e27cfdf4443293ba3dabbf940cc800
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 78db1b1bd5ebe562c630f547080e048499d2bc996eec7fd59a7917e005e1c090
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6510532619B8196D760DB14E8903AFB3A4FBC4750F405136E68D87BA9EF3DD548CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00007FF6EDA1EF18
                                                                                                                                                                                                  • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00007FF6EDA1EFEE
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::$Affinity::operator!=EmptyHardwareQueue::StructuredWork$Char_traitsshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Shell_TrayWnd$Taskbar
                                                                                                                                                                                                  • API String ID: 2730265358-1897506974
                                                                                                                                                                                                  • Opcode ID: e13268fb7d0a4ba1811f799af18aeb9c53393e1eb6fb849ad0eea4d8e799c8eb
                                                                                                                                                                                                  • Instruction ID: b770f9d7957b5a9bd2a2823f2ac7592df2f00a563ee0408b90efb14d83dfda94
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e13268fb7d0a4ba1811f799af18aeb9c53393e1eb6fb849ad0eea4d8e799c8eb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4322D333619AC195E6609B15E8913EFB3A4FBC4740F405232E6CD83BAAEF2DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: a9d5860ebe415712d8b257ac9dde7835a5faf24c2bc607e99c202444bbca76bd
                                                                                                                                                                                                  • Instruction ID: 9fcfb5cde51431b9a94bfd78f63e9725d91cae9c863c0ff4affe801f8a914bc4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a9d5860ebe415712d8b257ac9dde7835a5faf24c2bc607e99c202444bbca76bd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 75C1D333B0C78691E661AB19D4443BA7760FF80B90F550231DA4E87795FE7EEA49830E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$MetricsSystem
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 2388057244-4108050209
                                                                                                                                                                                                  • Opcode ID: f5f70d36f285243dcdca0e492648b0aea20843d87705ef4eec6c6b04cc8d10ef
                                                                                                                                                                                                  • Instruction ID: 8ee66ffdb75fdf886357fca00204aedb4e1d465b6b490cf2eeb8a9efafa48952
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f5f70d36f285243dcdca0e492648b0aea20843d87705ef4eec6c6b04cc8d10ef
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 96012C726196448BE7248F24E05836AB7A5F788744F505139E68E47788DF7FC208CF01
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Decorator::getTableTypebool_shared_ptr$Concurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2631667939-0
                                                                                                                                                                                                  • Opcode ID: 68703af9690580a6c391b1de1258b6b607268a60d6d621afee36c53d488083b5
                                                                                                                                                                                                  • Instruction ID: aa0a77e4a096579362b861fc9cdd707d86f45b4380ff21f598e02a1b5e082871
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 68703af9690580a6c391b1de1258b6b607268a60d6d621afee36c53d488083b5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2AC11D2361DAC690DA61DB15E4913EFA360FBC8780F405432E6CD87BAAEE2DD544CB09
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 10ffd26b2b9e9b3e59ce3bf3b505035bcdfe3577caacfa0f756c3861c042ef31
                                                                                                                                                                                                  • Instruction ID: 9730431e92f9bfb24b188634f826479819afd24fd05db5de1b2384d14ce7be8a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 10ffd26b2b9e9b3e59ce3bf3b505035bcdfe3577caacfa0f756c3861c042ef31
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4C14D3260DAC195DA60DB15E4403EBB3A4FBC5790F505132EA8D83BAAEF7ED548CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • RegOpenKeyExW.KERNEL32 ref: 00007FF6ED887FAE
                                                                                                                                                                                                  • RegQueryValueExW.KERNEL32 ref: 00007FF6ED888067
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32 ref: 00007FF6ED888093
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsCloseOpenQueryValueshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Software\PCAppStore$status
                                                                                                                                                                                                  • API String ID: 2952970082-3794422696
                                                                                                                                                                                                  • Opcode ID: 277999f9b99cc4fcaa974b73e0284b8aa673715914bf494b8deec28c09fea1b2
                                                                                                                                                                                                  • Instruction ID: cccdd640f59c8d8673db45062e344fca223399e34786c69c471133cf15dd00b5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 277999f9b99cc4fcaa974b73e0284b8aa673715914bf494b8deec28c09fea1b2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6961F232619AC195DBA09B14F8903AFB3A4FBC4740F405132E68E87BA9EF3DD548CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • OpenEventW.KERNEL32 ref: 00007FF6ED92B472
                                                                                                                                                                                                  • shared_ptr.LIBCMTD ref: 00007FF6ED92B52D
                                                                                                                                                                                                  • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00007FF6ED92B540
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED92B58E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::$EmptyQueue::StructuredWork$shared_ptr$Affinity::operator!=Char_traitsEventFac_nodeFac_node::_HardwareOpenstd::_type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: DEBUGSCREEN_EVENT
                                                                                                                                                                                                  • API String ID: 4219698036-491765807
                                                                                                                                                                                                  • Opcode ID: e9f080ca109fdc08da31f34fad3428b09bda7482e27278aa3b7d2afffeb74cf1
                                                                                                                                                                                                  • Instruction ID: 52376ff4c9ac6dae28d246df1780b8db577346832f568cee27d4aec9555943e1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e9f080ca109fdc08da31f34fad3428b09bda7482e27278aa3b7d2afffeb74cf1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F51283361DAC191DA20EB15F8813EFA3A4FBC4784F405032E68D87BAAEE2DD504CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2067211477-0
                                                                                                                                                                                                  • Opcode ID: 757ef5434b9a1d74de09006ad08ad3255dad4eb4116d364169839fd92a22bb5d
                                                                                                                                                                                                  • Instruction ID: 1fc77a1357a74fa3ebb0b02fa0a6bc1f05a26e4c1425698ac8cab786c85a24eb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 757ef5434b9a1d74de09006ad08ad3255dad4eb4116d364169839fd92a22bb5d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8A214727B0974286EE14DF69E41427AA360EF84BD0F144531DE4DC7795FE3EE6408749
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED88EA5E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2B77
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2BC2
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2B40: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2BD1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • {"app": {"widget":{"savedPosition": {"x": %d, "y": %d}}}}, xrefs: 00007FF6ED88ED8B
                                                                                                                                                                                                  • {"app" : { "init" : {"guid":"%ws","cache_folder_path":"%ws", "user_version":"%ws", "windows_version":"%ws", "locale_layout":"%ws, xrefs: 00007FF6ED88E89B
                                                                                                                                                                                                  • widgetInfo, xrefs: 00007FF6ED88EC1B
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$shared_ptr$Char_traitsCloseCreateQueryValuetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: widgetInfo${"app" : { "init" : {"guid":"%ws","cache_folder_path":"%ws", "user_version":"%ws", "windows_version":"%ws", "locale_layout":"%ws${"app": {"widget":{"savedPosition": {"x": %d, "y": %d}}}}
                                                                                                                                                                                                  • API String ID: 2877627145-1185860185
                                                                                                                                                                                                  • Opcode ID: ff55d5b52e10348e8a490d0560987e5f2dd6f87ae6e77eeb18904e11fb88bdd9
                                                                                                                                                                                                  • Instruction ID: b762ce808d92112e57f96e97fa949dd5db6034ee0fc11b9a94699c38493b131d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ff55d5b52e10348e8a490d0560987e5f2dd6f87ae6e77eeb18904e11fb88bdd9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C5F18C3620ABC595DAB19B15E8943DFB3A4FBC8780F405126DACC83BA9EF39C554CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_SchedulerScheduler::_shared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: 2${"app": {"init":{"direction":"%c","screen_size":{"with_topbar":%d,"t":%d,"l":%d,"b":%d,"r":%d}}}}
                                                                                                                                                                                                  • API String ID: 3472098950-2542400605
                                                                                                                                                                                                  • Opcode ID: d493c2aabf03a11dcc9f0cc9c36ce353b657568042bb082f71eeeaefe516538e
                                                                                                                                                                                                  • Instruction ID: faf1d000165193466a6c4ea29c69523932baf391b15639e9c98f9b605b832622
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d493c2aabf03a11dcc9f0cc9c36ce353b657568042bb082f71eeeaefe516538e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C891A276609AC59ADA70DB59F48439FB7A0F7C9B80F004126DA8D87B6AEF39D444CF04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_SchedulerScheduler::_
                                                                                                                                                                                                  • String ID: 0u${"app": {"topbar": { "fullScreenMode": %d }}}${"app": {"topbar": { "rBinStatus": %d }}}
                                                                                                                                                                                                  • API String ID: 2780765137-351494797
                                                                                                                                                                                                  • Opcode ID: 0e28eb98a689dd8f376cec79f8da131cc8ec644188ad33c6bdce887685f63f7e
                                                                                                                                                                                                  • Instruction ID: 7e721ad10358e9b14b0e901cf51765b0d2b9b6e8c360e41d1539472276aaae31
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e28eb98a689dd8f376cec79f8da131cc8ec644188ad33c6bdce887685f63f7e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5B611032619BC195DA60DB19E4803AFB7A1FBC0780F405122EACD83BAAEF3DC544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseConcurrency::scheduler_worker_creation_error::scheduler_worker_creation_errorOpen
                                                                                                                                                                                                  • String ID: registry was not opened
                                                                                                                                                                                                  • API String ID: 151454242-1342567452
                                                                                                                                                                                                  • Opcode ID: e7f155eaf6740a5822faddbece284a374d683f37dee313fa86ab3644c62f4564
                                                                                                                                                                                                  • Instruction ID: c0427e68fcf0e1b686cd8586726dd23905a08855bbeb38c2e8d6767010482858
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7f155eaf6740a5822faddbece284a374d683f37dee313fa86ab3644c62f4564
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B951F432619AC195DA609B16F8903AFB3A0FBC5780F405032EACD83BA9EF3DD544CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: System$Metrics$FromInfoMonitorParametersPoint
                                                                                                                                                                                                  • String ID: (
                                                                                                                                                                                                  • API String ID: 865970660-3887548279
                                                                                                                                                                                                  • Opcode ID: 69379b71d89e370083254ae015fbf5231837ec13cd78d46de7af95be8278e44c
                                                                                                                                                                                                  • Instruction ID: d2d75826110d3802121a5f6684202995f44f11fde78b0fc46e43c91f1d8e88c8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 69379b71d89e370083254ae015fbf5231837ec13cd78d46de7af95be8278e44c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4331A633A0C6858AD3558F5AE04032AB7B1FBD4799F108136D68D87754EF3DD6408F0A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • OpenEventW.KERNEL32 ref: 00007FF6ED87C909
                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32 ref: 00007FF6ED87C934
                                                                                                                                                                                                  • CloseHandle.KERNEL32 ref: 00007FF6ED87C955
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsCloseEventHandleObjectOpenSingleWaitshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: ClosingEvent
                                                                                                                                                                                                  • API String ID: 4183184898-2998232585
                                                                                                                                                                                                  • Opcode ID: 8c11d7e454918effde93ab7a6d788b22856cbec416c5c3415354fcb66bc4309d
                                                                                                                                                                                                  • Instruction ID: a339409594f693b26dc5e0808f20ea626b42f7c96471b5bf19b1ec76c2b6d02b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8c11d7e454918effde93ab7a6d788b22856cbec416c5c3415354fcb66bc4309d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7A316B33619A4192E650AB24E4913AFB7A0FBC4780F505132E68DC3BB9EF3ED545CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9270: Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00007FF6ED8B9419
                                                                                                                                                                                                  • shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B8600: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED8B861A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::task_continuation_context::task_continuation_contextDecorator::getTableTypeshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4040233825-0
                                                                                                                                                                                                  • Opcode ID: bae2c550baf2a5612c7074e31594eee9ba22d4e617217c42a9d0fa30261c7488
                                                                                                                                                                                                  • Instruction ID: 530d203c84e701b440fcc3e93ef00e95597d80428acc68fe6e3efbd055c23e61
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bae2c550baf2a5612c7074e31594eee9ba22d4e617217c42a9d0fa30261c7488
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B341083761DA8595DA20EB14E4913EFA761FBC5384F801432E68DC3BAAEE2DD544CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$ObjectSingleWait
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 282557418-0
                                                                                                                                                                                                  • Opcode ID: 6bd61c84f896b01dfc10da1bc64f5e67bdb71a9c3fc2d22c8523c3de64222407
                                                                                                                                                                                                  • Instruction ID: 1eab640c50795d9605cf0f806a4d4a76a9110e44719517b83e259697a051c510
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6bd61c84f896b01dfc10da1bc64f5e67bdb71a9c3fc2d22c8523c3de64222407
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F311E66E0974683EE109B29E44537F6390FF81784F901535EACD877EAEE2DE1428B09
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCreateQueryValuestrrchr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2429320508-0
                                                                                                                                                                                                  • Opcode ID: ce006583a4b91b947db29b944f40f07ab1453f6f8c70c26e61b6eb1f357722d4
                                                                                                                                                                                                  • Instruction ID: cab93d51d26c1541feb9848784d640d1d28676f42ef89cc3c362f9cc27b1d7d0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce006583a4b91b947db29b944f40f07ab1453f6f8c70c26e61b6eb1f357722d4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0C311732629A8196D750EB14E4903AFB360FBC0780F505132EA8DC3BA9EF3DD9448B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateInitialize$FileIcmpInstanceSecurity
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 897544864-0
                                                                                                                                                                                                  • Opcode ID: 966f8a8afdc4bd3b5b9d659171bfa2a428fbbfc32047747d287fb938234c05a9
                                                                                                                                                                                                  • Instruction ID: e3981f7709498d14a7de0d057d1b8814ed160188a474c6f5657bd21943f60d37
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 966f8a8afdc4bd3b5b9d659171bfa2a428fbbfc32047747d287fb938234c05a9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BF313C32B08B8982EB00DF2AF45935A73A1FB85B94F404235EA9D477A5DF3ED1458B04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$CreateQueryValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2495337196-0
                                                                                                                                                                                                  • Opcode ID: 4ef0f0b63c2bf33d17e04aa836e09ed6920e36a4895e769e3c160025ec55385c
                                                                                                                                                                                                  • Instruction ID: 21b7a2187179376a36146f452a36c90911ee5f6fbb2d6646938aa02504a428ce
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4ef0f0b63c2bf33d17e04aa836e09ed6920e36a4895e769e3c160025ec55385c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7821EC2262CA8186D6509B25F45036FB7A0FBC1781F102031FBDE87BA9DF2ED5548B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ChangeCloseDecorator::getExceptionFileFormatHeaderMessageNotifyRaiseTableTypeValuestd::bad_exception::bad_exception
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 364703902-0
                                                                                                                                                                                                  • Opcode ID: 76eb26f7f222be63711d01b012d10820d7f2fa82cb4d502e880469120c521816
                                                                                                                                                                                                  • Instruction ID: 1de192880b604ea28dba0ddf833486e6510edcd6ca9c47de95944967a632537a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 76eb26f7f222be63711d01b012d10820d7f2fa82cb4d502e880469120c521816
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F4216A32618A8186E720DB15F44439AB7B0FBC5788F504035E68D87BA8EF7ED648CB04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED861BF9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyFac_nodeFac_node::_Queue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID: $@
                                                                                                                                                                                                  • API String ID: 3399187363-1077428164
                                                                                                                                                                                                  • Opcode ID: 933ecb569581e402640db7b1f6e32658f8b8396350dd69f31e5717d71b9c6365
                                                                                                                                                                                                  • Instruction ID: dff185dd66b6bc613e50bc2d0815d18eabfec380c2cef3fcc04f7f0902d030a8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 933ecb569581e402640db7b1f6e32658f8b8396350dd69f31e5717d71b9c6365
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 58D1D172619BC6A9DA719B04E8803DBB3A4FBC9344F405126D6CC83BA9EF7DC548CB40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED91C056
                                                                                                                                                                                                  • HandleT.LIBCPMTD ref: 00007FF6ED91C065
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED91BF10: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF6ED91C0B2), ref: 00007FF6ED91BF39
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::details::_CriticalHandleLock::_OpenProcessReentrantScoped_lockScoped_lock::~_type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: NW_store.exe
                                                                                                                                                                                                  • API String ID: 131083509-3827304589
                                                                                                                                                                                                  • Opcode ID: 0c416f2846a1c3c508a7e072f5c92f0240496c519ca0bde5f2294de10ccc2a7f
                                                                                                                                                                                                  • Instruction ID: 91939726f84ebc6fc88e9beb53337fef19682ef3bd02ee8e7827a85ba0e98e1a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c416f2846a1c3c508a7e072f5c92f0240496c519ca0bde5f2294de10ccc2a7f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C341E73760DA8195DA609B15E4803ABB7A4FBC4784F501132E6CD83BAAEF3ED544CF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • WinHttpOpen.WINHTTP ref: 00007FF6ED8BB8AE
                                                                                                                                                                                                  • WinHttpSetTimeouts.WINHTTP ref: 00007FF6ED8BB920
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyHttpQueue::StructuredWork$Char_traitsOpenTimeoutstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: WinHTTP 1.0
                                                                                                                                                                                                  • API String ID: 2528808869-2851767304
                                                                                                                                                                                                  • Opcode ID: bc361658a549af44957303e0ed98f100f08e34caa4382285384791907d6d8207
                                                                                                                                                                                                  • Instruction ID: 6c5f4168f9d0b21369a4ca2d4f62f1dde9876225ac183143f52682d55bf66cd6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bc361658a549af44957303e0ed98f100f08e34caa4382285384791907d6d8207
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FE312636628A8186E650DB19E4903AFB7A0FBC0780F506031E68E87BA8EF7DD444CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Decorator::getTableType$shared_ptr$Char_traitsConcurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 43780872-0
                                                                                                                                                                                                  • Opcode ID: 1ef0f8c0e1062286438733dc52607a946b9e41f6d5c8eab4ad4335bcea99764b
                                                                                                                                                                                                  • Instruction ID: d25e2f38e540ec7456244d25f04a9fc842d976f066880d3700202a98a2fcfc30
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1ef0f8c0e1062286438733dc52607a946b9e41f6d5c8eab4ad4335bcea99764b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C81D43261DA8691DA70EB15E4913EFA360FBC5780F805132E68D87BAAEF2DD504CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                  • type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9270: Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00007FF6ED8B9419
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B8600: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED8B861A
                                                                                                                                                                                                  • shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Char_traitsConcurrency::details::Concurrency::task_continuation_context::task_continuation_contextDecorator::getEmptyQueue::StructuredTableTypeWorkshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2402306799-0
                                                                                                                                                                                                  • Opcode ID: 95688012b2acad62642fb76bfb4580da9d097e2e207ece57d37164914cc2ea54
                                                                                                                                                                                                  • Instruction ID: 9fd6bd5ca3d212c9586372722282ba5d904d414383974d62c60f0016cd716cd1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 95688012b2acad62642fb76bfb4580da9d097e2e207ece57d37164914cc2ea54
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A951C93761DA8691DA60EB14E4913EFA760FBC5384F805532E6CDC3BAAEE2DD504CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Lockitstd::_$Concurrency::cancel_current_taskLockit::_Lockit::~_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2115809835-0
                                                                                                                                                                                                  • Opcode ID: 29e9c4f8d4c98a85564133ac0d28bfe0ed074c43554d20483b455ed38e318f33
                                                                                                                                                                                                  • Instruction ID: e7b6f2529590220ac1f0c2fa5460e4f33db773492eefcc31518f36e817f29141
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 29e9c4f8d4c98a85564133ac0d28bfe0ed074c43554d20483b455ed38e318f33
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E6418733718B8981EA14DB19E48036D3361FB88FC0F104432DA5E87BA9EE3ADA51C345
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED904C22
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8E6510: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8E6521
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED904CA5
                                                                                                                                                                                                  • _Bitmask_includes.LIBCPMTD ref: 00007FF6ED904D0C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Bitmask_includes
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2390111963-0
                                                                                                                                                                                                  • Opcode ID: 832343a839936b933ecb8446bca81fc451b953b73e021aaa193640c42c430be1
                                                                                                                                                                                                  • Instruction ID: ad1485c6804e0e82662af75036706bda2fbc6fdd89db3bc757ca522818e65c90
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 832343a839936b933ecb8446bca81fc451b953b73e021aaa193640c42c430be1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA412F23A1C68285EA30EB11F8513AFA3A0FBC4784F400135E6CDC7A9AFF2DD9448B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA48184
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA3BEC0: _Idl_distance.LIBCPMTD ref: 00007FF6EDA3BF0F
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9E53
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9EDC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$Idl_distancechar_traitstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: profile
                                                                                                                                                                                                  • API String ID: 4115068943-2170006031
                                                                                                                                                                                                  • Opcode ID: 74fbb5ba1eefa242b2a3282b31df58e229aa0ba0befdfbac67dfc8068cd4002d
                                                                                                                                                                                                  • Instruction ID: 7e2650cb110c5c1bef344a5f5760ebf50d7ec32ee965ea45efb1c8b87fbcec9a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 74fbb5ba1eefa242b2a3282b31df58e229aa0ba0befdfbac67dfc8068cd4002d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C691B43260DAC691DA609B15E8913EFB3A4FBC4380F405032E6CD87BAAEF6DD545CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateProcessstrrchr
                                                                                                                                                                                                  • String ID: h
                                                                                                                                                                                                  • API String ID: 4037516736-2439710439
                                                                                                                                                                                                  • Opcode ID: 208cc1f9ae3a861d9264646bc0c8608afd709e42d125a95b804f8b56166ec431
                                                                                                                                                                                                  • Instruction ID: 2f6150af28ae6413337cbebcd1bade4eb2affb8660e808dcdefb698d2f03ca03
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 208cc1f9ae3a861d9264646bc0c8608afd709e42d125a95b804f8b56166ec431
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 71210432618A8286E750DB54F4903AFB7A4FB90784F505035E68D87BA9EFBDD508CF40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: 7545e5831b812e6625672f6c69a49b423e83b1d1d8b1c572342f66566f41ca8c
                                                                                                                                                                                                  • Instruction ID: c34d53e25b0e35bd5476bc7c75d5e52091deb81c7708c6044634eca103e0d0fd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7545e5831b812e6625672f6c69a49b423e83b1d1d8b1c572342f66566f41ca8c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7051A033B0864187EA78DA2DE54437973A0EF55B54F140234DA8EC7691EF2EEA02C75A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: 65a8e1ad530ea15df56b3f291f143448645503377ccab56e0da2e811b89f2616
                                                                                                                                                                                                  • Instruction ID: 245990770c3074387c90162ef3511f51dc6a417bf4ddc245a6885229e36f20b8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 65a8e1ad530ea15df56b3f291f143448645503377ccab56e0da2e811b89f2616
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DC319F23B18A4682EA50DB18E4503B93361EF95B80F980131E91EC73D6FE3FE615C30A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1248567937-0
                                                                                                                                                                                                  • Opcode ID: 3fe2a8670af450bb78b114a864df4bb570cbfd629f1ebe0fabd81e8f03d97670
                                                                                                                                                                                                  • Instruction ID: f42b90cd5d981608296f21dc708654f3c30dc8ce30b471759e963ccfd2797e72
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fe2a8670af450bb78b114a864df4bb570cbfd629f1ebe0fabd81e8f03d97670
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F313B2361DA8191DA60DB15F4803AFA7A0FBC5788F905032E6CD83BAAEF7DD544CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1248567937-0
                                                                                                                                                                                                  • Opcode ID: 9f1ad5c6b08b5832db45b8196b0206b7115631ed6635ed0e9bd26fec86db5ab9
                                                                                                                                                                                                  • Instruction ID: fd3b88ef8a2525a4d81a4efa5bd20d7b1cb03a7058af92b40636c1d98352e62d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9f1ad5c6b08b5832db45b8196b0206b7115631ed6635ed0e9bd26fec86db5ab9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: ED216D2361DA8185DA209715F84026FABA4EBC5784F901131F6CEC7BABEF2DD145CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: QueryValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3660427363-0
                                                                                                                                                                                                  • Opcode ID: 22f4788265f30d3f4b6ed6128885f3b5e68575b470a6ab592bc7919b73bcd714
                                                                                                                                                                                                  • Instruction ID: ad3f48a3d18cab626141f266818b0d2628b902b8fbcf19fa6b2e3ef80ebd91f7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 22f4788265f30d3f4b6ed6128885f3b5e68575b470a6ab592bc7919b73bcd714
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46210A33629B8182EA908B1AF58421FB3A4FB85B84F501135FA8D47B28EF3EC544CF05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CallDecorator::getIndexatomicshared_ptr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3391904811-0
                                                                                                                                                                                                  • Opcode ID: 86d0c8c66ebbcc9dea27987f530da449ab3c7484becabb7d14f8e696e5588479
                                                                                                                                                                                                  • Instruction ID: 52d808d9984c52485cdaf0a242fe8d62e8c49afe48c1fbceeaf7555c6bcacb9a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86d0c8c66ebbcc9dea27987f530da449ab3c7484becabb7d14f8e696e5588479
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 56118036628A8592DA50DB19E48115BB7A4FBC8B84F905522EBCE83B69EF3DC5148F04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Affinity::operator!=Concurrency::details::HardwareSleepSubatomic
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3805686545-0
                                                                                                                                                                                                  • Opcode ID: 4d6ef90e047a975d8abee179b81c587c0840ec973f56a393ef8e92ab74b7bc6b
                                                                                                                                                                                                  • Instruction ID: f07ebef184d75af042258fcc3e8f2e71719922b1abf12cb6acca4fe2805bfeb9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4d6ef90e047a975d8abee179b81c587c0840ec973f56a393ef8e92ab74b7bc6b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 81015163A3D542A1DA10EA10E4402BF6364FF84354F801031F58EC7AEAFE6DD505CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1173176844-0
                                                                                                                                                                                                  • Opcode ID: 45204aa356c7909b8c4d379b9801fcb8ad09af89818c596a895318abe577d070
                                                                                                                                                                                                  • Instruction ID: dc88d9b84db379672850f31c73bf47683d2622aafc38c1ca2f21b7356826ea59
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 45204aa356c7909b8c4d379b9801fcb8ad09af89818c596a895318abe577d070
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8AE0EC07F1E18745FD58226ED85A3B901500F16BB2E1C5B30DD3DC72C3BD1EA655811E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorFreeHeapLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 485612231-0
                                                                                                                                                                                                  • Opcode ID: f769fc9b6d24f10a7de486087c3a8dbc6dd87fc899171df106d8255cd084161c
                                                                                                                                                                                                  • Instruction ID: ad00228f21b801afe7ec5a0e523b1aa0a818ecec5844ea4917a81362b2f9260a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f769fc9b6d24f10a7de486087c3a8dbc6dd87fc899171df106d8255cd084161c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: ABE0C24BF0860642FF2867FED8483B422855F98B01F040430C80DC7292FD2FA644430F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ShowUpdate
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2310006639-0
                                                                                                                                                                                                  • Opcode ID: fa99ff994afb6ca19f467a8b358dca153c7d8b2e0a0ff7507d7d34480cf8ae3f
                                                                                                                                                                                                  • Instruction ID: cdaaead4209cdf1eea9c02d09b457d9c16a832535acef0f79a72d186b2c649b3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fa99ff994afb6ca19f467a8b358dca153c7d8b2e0a0ff7507d7d34480cf8ae3f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5DE01A26B25A8282EB409B1AD88031967A0F7C4B41F558021EA4E87364EF3AC4858700
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ChildDesktopEnumWindowWindows
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2514311848-0
                                                                                                                                                                                                  • Opcode ID: 83aca2b6aceda99714988ffbcded5e96576585da6c7b39829501b20319aba58a
                                                                                                                                                                                                  • Instruction ID: b0a1c886f2235c56d3ccb50acaa69efcfce4e46bb5b351ac9a21741b862ce0ee
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 83aca2b6aceda99714988ffbcded5e96576585da6c7b39829501b20319aba58a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D5C01227F26706D1DA046B79F8992152360FF5D751FA09030C40D46610EF2ED1598B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ChildDesktopEnumWindowWindows
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2514311848-0
                                                                                                                                                                                                  • Opcode ID: 34eb3a8add483f8585acccb833539845e7778abf648ebc6cd8c118d202aa75f4
                                                                                                                                                                                                  • Instruction ID: 120a475d895f6ab85fa2190be4a975253e7914c22fd7e4653a32f11ba1930f3e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 34eb3a8add483f8585acccb833539845e7778abf648ebc6cd8c118d202aa75f4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 76C01227F16B06C1DA046B79F8992142360FF4D751FA09030C40D47614AF2FD1598B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::ios_base::goodstd::ios_base::width
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3809604888-0
                                                                                                                                                                                                  • Opcode ID: a4f460fe90a2ce7597c6381b6d439ba38d7313e8d536a10ad41f19d6f567c6c7
                                                                                                                                                                                                  • Instruction ID: 51c41d73d9168e3db4e7886111888d981a9775a6352695619fcc4369a445e698
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a4f460fe90a2ce7597c6381b6d439ba38d7313e8d536a10ad41f19d6f567c6c7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B510D73A0C6858AD760DB65F55036FB7A0EB89784F404136E68DC7B9AEE3DE4008F45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8C39CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8A2050: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8A205E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8A2050: _Min_value.LIBCPMTD ref: 00007FF6ED8A2084
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Min_value
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1082587609-0
                                                                                                                                                                                                  • Opcode ID: 31f732199df631a081a272edbd031c5b3f970330b50aede084ed654c6643dc19
                                                                                                                                                                                                  • Instruction ID: b71b587ad17d67e727d36a20c31a3986b99ca1179e613b33f6223a59a0266942
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 31f732199df631a081a272edbd031c5b3f970330b50aede084ed654c6643dc19
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6C51C537619F8485DA60DB1AE48026FB7A4F7C9B94F505526EECE83B29EF3DD0508B01
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowTextW.USER32 ref: 00007FF6ED8DCCF6
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredTextWindowWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2447981796-0
                                                                                                                                                                                                  • Opcode ID: df9d4a4ae4996c9d1f780e64a390d5f6fb1eca222dedf997d8cdd4b73692f30a
                                                                                                                                                                                                  • Instruction ID: 0db709b2bb2046ee9e81123faae7c618b5664056766b208321cce0a9c26c55b5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: df9d4a4ae4996c9d1f780e64a390d5f6fb1eca222dedf997d8cdd4b73692f30a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4F41F673618A8186E6209B25E4413AFB7A4FBC4794F401232E6CDC7BA9EF2DD544CF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __crt_scoped_stack_ptr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1704660383-0
                                                                                                                                                                                                  • Opcode ID: 2b64867363028eff0c91442592d46d6c6cb3060f987761c6e3f93457ab4b6b66
                                                                                                                                                                                                  • Instruction ID: e0c8f06578f3199f8e0735027b5ac927fa9a88027c35302dfa07d891ca8e7307
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2b64867363028eff0c91442592d46d6c6cb3060f987761c6e3f93457ab4b6b66
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2141267361CB8181DA609B15E4803AFB7A4FBC4784F404122EACE87BA9EF2DD544CF06
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: de6563d2351a93d56a707ff2e9ffac1e2461804c5103d7262ecea24f77ce5f30
                                                                                                                                                                                                  • Instruction ID: b63df341f5b3f6da285d4c713cfb095dd7c15d8a625a8b7e579fccb92a383e03
                                                                                                                                                                                                  • Opcode Fuzzy Hash: de6563d2351a93d56a707ff2e9ffac1e2461804c5103d7262ecea24f77ce5f30
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C31BE23F1864286F625AB29C8013BD2A50AB44BA0F810235DD1D8B3D2FF7EE641D35F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED88C610: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED88C61E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED88C610: _Max_value.LIBCPMTD ref: 00007FF6ED88C643
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED88C610: _Min_value.LIBCPMTD ref: 00007FF6ED88C671
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED86C27C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 348937374-0
                                                                                                                                                                                                  • Opcode ID: 2e7617e9f26784f48146d2f23e319645386971708dbbc5905693705d5eee8036
                                                                                                                                                                                                  • Instruction ID: ea61c349f87e2aa5d77f5e6d925246ae39b214b203b23663dd085332ab70e196
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2e7617e9f26784f48146d2f23e319645386971708dbbc5905693705d5eee8036
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A31383762DB8181DA60DB55F48126FA7A0FBC9B94F501536EACD83B69EF3ED1408B00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateEventW.KERNEL32 ref: 00007FF6EDA20A78
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA21580: _Ptr_base.LIBCPMTD ref: 00007FF6EDA21671
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA22B10: RegNotifyChangeKeyValue.KERNEL32 ref: 00007FF6EDA22B48
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA22B10: FormatMessageW.KERNEL32 ref: 00007FF6EDA22B93
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA22B10: RegCloseKey.ADVAPI32 ref: 00007FF6EDA22BAC
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA22B10: std::bad_exception::bad_exception.LIBCMTD ref: 00007FF6EDA22BCD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ChangeCloseCreateEventFormatMessageNotifyPtr_baseValuestd::bad_exception::bad_exception
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1108121324-0
                                                                                                                                                                                                  • Opcode ID: 75d7bb3f5a2ce2ead4b1bb343e34603fb5a372efd26bfbef2cff9d08b5d35dc0
                                                                                                                                                                                                  • Instruction ID: 0aab3f81fa27b1e8f0cfe29427500cd9f15bf681728c84a9373122ee2ee8af60
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 75d7bb3f5a2ce2ead4b1bb343e34603fb5a372efd26bfbef2cff9d08b5d35dc0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A131B532619B8581DBA0DB1AF8813AFB3A4F7C4784F105126EACD83B69EF3DD1558B44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Initialize
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2538663250-0
                                                                                                                                                                                                  • Opcode ID: fe6f5bd1ccfb4118a8b4ae9430a1a99293068149ed12bf4605fdd7bc964e153b
                                                                                                                                                                                                  • Instruction ID: 63766f9e787f78f4765fcd48f286adf9036b666f31b508cbb172c242cd19fbf6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fe6f5bd1ccfb4118a8b4ae9430a1a99293068149ed12bf4605fdd7bc964e153b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB210863A1CA4182DB10DB2AE44122FA7A1FBC4784F505536EACD83B69EF3DC2158F09
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Ptr_baseRef_count_baseRef_count_base::_std::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1305008675-0
                                                                                                                                                                                                  • Opcode ID: f2c31a4addac6dbac5e3632a4ff3ea31a07088855192d4136903aa902e043540
                                                                                                                                                                                                  • Instruction ID: b33bc91da4834903c229eb05a08cb78a811c89edbdc06a9275f2ca1f453dbae8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f2c31a4addac6dbac5e3632a4ff3ea31a07088855192d4136903aa902e043540
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D631E632628B8482E650DB15F4413AFB7A0FBC5780F500526EACD87BAAEF3DD454CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: 2d669b50a574dd05308ef6dc74d62bc7c88741b736c846b8cb5d4488c288d3e2
                                                                                                                                                                                                  • Instruction ID: ed04fb4f711c6f6b73586baa79a19992cfb15c7b959482ab9699bfcd62013882
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d669b50a574dd05308ef6dc74d62bc7c88741b736c846b8cb5d4488c288d3e2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52219233718A8587DB618F2CD48037976A0EB85B94F644234EA9EC76DDEF3ED5018B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: bbdd6f4acd2c37f0f0cea18607fb670f7e5b7d0a06c147e43de415a555d17051
                                                                                                                                                                                                  • Instruction ID: e2e8add7da6b74e78326714b9a7104ff3f6714c561d518be524509d27c350143
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bbdd6f4acd2c37f0f0cea18607fb670f7e5b7d0a06c147e43de415a555d17051
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB118723F0D68185EA609F59E41137AA360AFC4BC0F044031EB4D97686EF7FD6108B4E
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow__invalid_parameter_noinfostd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 162856716-0
                                                                                                                                                                                                  • Opcode ID: f317c40e7c82e333738203e5076dc8a5d84fc5089921fd3d095d3c185a2b7942
                                                                                                                                                                                                  • Instruction ID: 6414f75aa0a48b891797fa05a04a0c893e5bd4f6a8b7ec06c7d7158f86e0dc9c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f317c40e7c82e333738203e5076dc8a5d84fc5089921fd3d095d3c185a2b7942
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CC211833A29A8182D640DB24E45136FB7A4FBC5B80F505436F68D83BA9EF3EC510CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow__invalid_parameter_noinfostd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 162856716-0
                                                                                                                                                                                                  • Opcode ID: b75a30dc411346ec40c0fa6fd921f14324965e0a4284b85fe91dd3eb85e76723
                                                                                                                                                                                                  • Instruction ID: 0bf6c5ac14d098e639ea2987a3dd11a99c9b928c9174dde2a5b176f8f9320d24
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b75a30dc411346ec40c0fa6fd921f14324965e0a4284b85fe91dd3eb85e76723
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E4210733A29A8182D6409B14E85136EB7A4FBC5784F505436E78D83BAAEF3EC510CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: atomicstrrchr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3831846996-0
                                                                                                                                                                                                  • Opcode ID: a49848a1a8774d1fd625f84f476130a88851185107e1e2029085797132219405
                                                                                                                                                                                                  • Instruction ID: 93fdffdc9174c970fbbf793d9a2fd8297bce732a79a12b0197d892fff430bfb8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a49848a1a8774d1fd625f84f476130a88851185107e1e2029085797132219405
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0711597360C68196DA20EB51E49036FA361FBC4794F005535FA8EC3BAAEF3DE5408B49
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::bad_exception::bad_exception
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2160870905-0
                                                                                                                                                                                                  • Opcode ID: 280bff553a658687436bad230de472fe0cb1b277e1ef10a290e884bff637d0f1
                                                                                                                                                                                                  • Instruction ID: 78680fd5ddde02adaae3c0cdb825d6b934d46579f836ce5c036d0fd24d30b824
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 280bff553a658687436bad230de472fe0cb1b277e1ef10a290e884bff637d0f1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7113323A0DB8585EB10DB59F09531BA760FBC5B94F000425EA8D477A9DFBDC114CB49
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: strrchr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3418686817-0
                                                                                                                                                                                                  • Opcode ID: 3118610efff567583dff9124c096110debf3f8b98eae21506b93e1729e4c0392
                                                                                                                                                                                                  • Instruction ID: 9ada65725c55e32c1e2ffa29d21052f69e67d25e0a6aa682837005c2a21d9812
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3118610efff567583dff9124c096110debf3f8b98eae21506b93e1729e4c0392
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 00119E37608B8886C720CF45E89162AB7A5F7C8B98F104625EA8D87B69DFBCD415CF44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow__invalid_parameter_noinfostd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 162856716-0
                                                                                                                                                                                                  • Opcode ID: f09bdae644c3539577301d987e8d135863d1e7eec8b64999cb8d9deee2815e4c
                                                                                                                                                                                                  • Instruction ID: 869f8cef0877ad214d7e87dda4d490a9aa69c28b1b25d93165f87437ddb1e74a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f09bdae644c3539577301d987e8d135863d1e7eec8b64999cb8d9deee2815e4c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA111932A29B8082DA40EB11E85136E73A1FBC5B80F405035E68E87BA9EE3ED5048B04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow__invalid_parameter_noinfostd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 162856716-0
                                                                                                                                                                                                  • Opcode ID: b2b787129ad8a83bef9f6558f096ac79c4fe43c2569ac0c06a25800ac4811191
                                                                                                                                                                                                  • Instruction ID: 968cf05027d3cde6be05892b58d77a820c256823c206ea02f2d87bbe9b86e9ae
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2b787129ad8a83bef9f6558f096ac79c4fe43c2569ac0c06a25800ac4811191
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF111932A2DB8082D640AB11E85136EB3A1FBC5B40F405436E68E87BA9EE3ED504CB04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow__invalid_parameter_noinfostd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 162856716-0
                                                                                                                                                                                                  • Opcode ID: 2d52c00e876d53c93af700e41cefade6c522f9ac208259b2e19d1578ca2051c3
                                                                                                                                                                                                  • Instruction ID: 3cafcbe89fdc8072b32f7bab3a74133fa347b74987750578aa2afb7a083146d9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d52c00e876d53c93af700e41cefade6c522f9ac208259b2e19d1578ca2051c3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72111932A29B8182D6409B15E45136F7361FBC5B40F405036E68E877A9EE3ED500CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Ref_count_baseRef_count_base::_std::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1391782822-0
                                                                                                                                                                                                  • Opcode ID: 0bdd5c369b61f68d45ed5ecdf1abb8e8d566dee830f1bf0898be95ed79b47dda
                                                                                                                                                                                                  • Instruction ID: cf2f679190712d7429909233e9f22b92db00bafbb89d267b06c0186618a514ab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0bdd5c369b61f68d45ed5ecdf1abb8e8d566dee830f1bf0898be95ed79b47dda
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0411E632628B8582D680DB1AF85026FB7A1FBC8780F100526FACD83B69EF3DD0508B44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215553584-0
                                                                                                                                                                                                  • Opcode ID: 48bb363744d182ba232372bc05be0a51e6b3cba4a4dbe6b332463a11a3904b04
                                                                                                                                                                                                  • Instruction ID: b525ab63d60ffaad470ab5c106827ecdc6857359c891b9cc0da163e4508a347d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48bb363744d182ba232372bc05be0a51e6b3cba4a4dbe6b332463a11a3904b04
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2B110033B00B06ACEB109FA4E4812ED37B8EB08358F510626EA4D53B5AEF35C295C395
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FreeTask
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 734271698-0
                                                                                                                                                                                                  • Opcode ID: b7b955615146dd32ae5c2dc1dff78ca65eb7a20aececea18cc9d2caec50889bb
                                                                                                                                                                                                  • Instruction ID: 3877739ebd1dccad4126beeb029da37253c1439593b9711b35892defe454756a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b7b955615146dd32ae5c2dc1dff78ca65eb7a20aececea18cc9d2caec50889bb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3B110473A28A8586E720EB19E45175AB3A1FB88748F401521F68D87A69EF3DE604CF44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED883D40: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00007FF6ED883D49
                                                                                                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6ED86BA02
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturnstdext::threads::lock_error::lock_error
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 414106306-0
                                                                                                                                                                                                  • Opcode ID: 171741ed0951541f69a11c5cf88bc68c480b22979b4d62449fb043332eba36fd
                                                                                                                                                                                                  • Instruction ID: 512520d9c12fbaa0d23a4271c24d651b69cf6e6daee67206329fdf2638eb65c9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 171741ed0951541f69a11c5cf88bc68c480b22979b4d62449fb043332eba36fd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CE015263629B8281D6609B29E44132FA394FB847A8F401231F5EDC3B99FF2DD1508709
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWidestrrchr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 276481755-0
                                                                                                                                                                                                  • Opcode ID: a64b7f83808317b1ae215d5ee3b81983ce64dcb3936d8aebc1c98ba459c1f7c1
                                                                                                                                                                                                  • Instruction ID: aaa0756f02adfc3fe0ab4c76fa5a5a71d32788d5c996ecb39a4ed029a8188f4c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a64b7f83808317b1ae215d5ee3b81983ce64dcb3936d8aebc1c98ba459c1f7c1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A01E533A0C64596D620AB15E48136BB7A0F7C9748F200225EA8DC7BE9DF3ED9418F45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED86C240: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED86C27C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1865873047-0
                                                                                                                                                                                                  • Opcode ID: c67d5f77bfe20d44a645308355032af3d2184034785ae6c8d82d84e6a8c4ada1
                                                                                                                                                                                                  • Instruction ID: b5a014fab9d3b7fac8a82608c5b25e2d6740d97d3c38cbcb0eb8b2c5cf8cff24
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c67d5f77bfe20d44a645308355032af3d2184034785ae6c8d82d84e6a8c4ada1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3501D37762DB8481CA50AB16F48015FBBA1F7CAB90F005126FACD83B6AEF2CD150CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6EDA3662D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8E6510: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8E6521
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1865873047-0
                                                                                                                                                                                                  • Opcode ID: e1e544e98d48ceb18f296b73191f32258dbb2aeeb63d8548b1f25af465585518
                                                                                                                                                                                                  • Instruction ID: 14585cca91abec37acd254024023b62ac9fa34fd78adfe96e6b607cc1ce9b31b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e1e544e98d48ceb18f296b73191f32258dbb2aeeb63d8548b1f25af465585518
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E2014376618B8586CB10DF1AE49121EBB70F7C9B85F508526EB8D83B28DF3AD511CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Name$NodeNode::
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2544435820-0
                                                                                                                                                                                                  • Opcode ID: cccd8c0411dc751e54d5c63acfce41961af6d934f708fbffee05c5b2483a8d59
                                                                                                                                                                                                  • Instruction ID: 006b60018734955d0c74a78f854ba9947e7946f2344a8cd6567904d06971c6d2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cccd8c0411dc751e54d5c63acfce41961af6d934f708fbffee05c5b2483a8d59
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B001133760CB8182DA10DF19E45036AB770F7C9784FA00122EB8D83A69DF7EC615CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: atomic
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1039557753-0
                                                                                                                                                                                                  • Opcode ID: c788e7c093894920f4408d3e5cdc642018b525308066ab43e1fdcfdb2c8523b6
                                                                                                                                                                                                  • Instruction ID: 9c7b8475e2df22641f16b035232f3aa6b6f189b0bdd3d3fe8d2d665b0e6e60c6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c788e7c093894920f4408d3e5cdc642018b525308066ab43e1fdcfdb2c8523b6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34F02827629F8592CA50EB21E48005BB371FBC9784B505222FA8E83B69EF28C940CF00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow_std::_$EnumThrd_detachWindowsshared_ptr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2678808225-0
                                                                                                                                                                                                  • Opcode ID: af43fc52814154e43e276657d961a3ba4ae48b91c0981162f7f2b8f38a663d05
                                                                                                                                                                                                  • Instruction ID: bacf536357d00f200c556eee25971e2862bf2bb7736e72ebccf9fa6a7bec8f5b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: af43fc52814154e43e276657d961a3ba4ae48b91c0981162f7f2b8f38a663d05
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7CF01223A6D942A2D900FB10E8525AF6321FFD1744F805031F28DC36AAFE2DD615CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FromMonitorPoint
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1566494148-0
                                                                                                                                                                                                  • Opcode ID: e65e66b222cf18009a69dd3586cea628a5d7f6036d7171f0dd8d900ad482fbca
                                                                                                                                                                                                  • Instruction ID: d02a455014d5518af9b2586c717ea147579cc07c2fd7bff12c36a5ccc4d101d6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e65e66b222cf18009a69dd3586cea628a5d7f6036d7171f0dd8d900ad482fbca
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DDF04B23928E8486D212DF28E44025BF7B1FFC9784F105222F68E56A19EF3EC5858F00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: QueryRecycle
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2469249176-0
                                                                                                                                                                                                  • Opcode ID: fa61a4ff1444731f67f3917574b7967f25590feff98c30a7ab62584c53bffcea
                                                                                                                                                                                                  • Instruction ID: d6b57246f0aec06678f8bb68ca70857252ec7647abb5c77f7397bc1c9429b5c9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fa61a4ff1444731f67f3917574b7967f25590feff98c30a7ab62584c53bffcea
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7CF09022E2CA4AD2EB509F11E84136B6361FF82701F905430E94E87684FF3ED5099F06
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • std::bad_exception::bad_exception.LIBCMTD ref: 00007FF6ED8A6791
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8A6BF0: std::locale::facet::facet.LIBCPMTD ref: 00007FF6ED8A6C08
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: std::_Lockit::_Lockit.LIBCPMT ref: 00007FF6ED87412F
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED874141
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED874153
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED874165
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED874177
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED874189
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: _Yarn.LIBCPMTD ref: 00007FF6ED87419B
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED874110: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00007FF6ED8741B3
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED876140: std::_Lockit::~_Lockit.LIBCPMT ref: 00007FF6ED8761C2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Yarn$std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_std::bad_exception::bad_exceptionstd::locale::facet::facet
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1679783481-0
                                                                                                                                                                                                  • Opcode ID: 4af16a1b8f7b8e4e60ffd41125d2d8e47fb3cc1927d634f56abe4d311dc4d798
                                                                                                                                                                                                  • Instruction ID: bb8600f16e220f55124fc52221af2936750338c450b5dc73e1584d76b6b215f2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4af16a1b8f7b8e4e60ffd41125d2d8e47fb3cc1927d634f56abe4d311dc4d798
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 94F03663709B85A5DA30DB15F4513AB7320FBC5744F805432D5CD877AADE2DD509CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: EnumWindows
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1129996299-0
                                                                                                                                                                                                  • Opcode ID: 86910d9b50b560ef658ac62af6094de62c36062c340e8d04610a5cedfa5480fe
                                                                                                                                                                                                  • Instruction ID: bb6d898e1b9dce4b2c5192b5bc6a5c31a03232c348534de8a125954548808aa6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86910d9b50b560ef658ac62af6094de62c36062c340e8d04610a5cedfa5480fe
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3F0FE73A1854192DA20EF14E48125BB774F7C4398F801223E2CD877A9EF6DD649CF05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Func_classstd::bad_exception::bad_exception
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3621584023-0
                                                                                                                                                                                                  • Opcode ID: ae430fc9e35576a6957c6e0227d7b09ea702acf4648832254e767f9578ddf3e3
                                                                                                                                                                                                  • Instruction ID: 53f0c32e4f33fcc5dcdf292ba5d20c1126280bccc7eb93222230b85b0c79973e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ae430fc9e35576a6957c6e0227d7b09ea702acf4648832254e767f9578ddf3e3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9FE04F27B18A85C2DA20AB21E85112F7370FBC9BC0F904031EACDC7BA5DF2DC5058B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::bad_exception::bad_exception
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2160870905-0
                                                                                                                                                                                                  • Opcode ID: 9f3dbffd76636ee9a3a51fa1edb9d345c546f4c08a543c5eb14f5981aff5e3ff
                                                                                                                                                                                                  • Instruction ID: 1d7cce39f8a9584b0408d801f1897ab5c5bc4d45a63eaf8a5984438010cbdd3b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9f3dbffd76636ee9a3a51fa1edb9d345c546f4c08a543c5eb14f5981aff5e3ff
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B2E0EC67A2DE4485D6A0DB06E48152BE761FBC8794F401131FA8D83B6DEF7DC5108B08
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateInstance
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 542301482-0
                                                                                                                                                                                                  • Opcode ID: 58d6b5f042915c1f4fdbaed8ed3d22259943122ce8b89558e29f3579e715362a
                                                                                                                                                                                                  • Instruction ID: bb6eb43f2e79c8bfa383cc7c0ec901776cf61f6fc8a37caff93f9258abc9e93e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 58d6b5f042915c1f4fdbaed8ed3d22259943122ce8b89558e29f3579e715362a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EBE05276608B8182C610DF59F44004AB774F799794F504525EACC43B28DF7DC265CF44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __std_fs_directory_iterator_open.LIBCPMT ref: 00007FF6ED904BF5
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA67A88: FindClose.KERNEL32(?,?,?,?,?,00007FF6ED904BFA), ref: 00007FF6EDA67AA9
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA67A88: FindFirstFileExW.KERNEL32 ref: 00007FF6EDA67ACB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$CloseFileFirst__std_fs_directory_iterator_open
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3791046848-0
                                                                                                                                                                                                  • Opcode ID: e19f5550250b921009a3916d4916d33cb18f5f8aaffaeab2630d8ac5ff992e1e
                                                                                                                                                                                                  • Instruction ID: f5fdffe0158a140f251781f893a19cf848dae4acc67cb8da512650e51025cc0f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e19f5550250b921009a3916d4916d33cb18f5f8aaffaeab2630d8ac5ff992e1e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28D09EB6A29B80C1CA44DB16F48105EB764F7D97C0F505425FACD43B29DF3CC1618B40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFindNext
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2029273394-0
                                                                                                                                                                                                  • Opcode ID: 528f0c6227063077f35c579620fe344fc96b9fe7a16bcc26394650e6642471c2
                                                                                                                                                                                                  • Instruction ID: 11256b0f51d4fe9875e54b557269a47a38c08f18be262f2502593217757a8455
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 528f0c6227063077f35c579620fe344fc96b9fe7a16bcc26394650e6642471c2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 67C08C06F29402C1E2081B2ADCC222021D06B04310F600030C10CC5150ED2FA3E28716
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: allocator
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3447690668-0
                                                                                                                                                                                                  • Opcode ID: 4122839f77c4798dbfb966a4c2f4a1fec628bbbccf8eeabd92308ae2b4d703ea
                                                                                                                                                                                                  • Instruction ID: 0e0fb525d5a854965564732e5bd4ca98776df0c0954632f8d000d288df8f1b90
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4122839f77c4798dbfb966a4c2f4a1fec628bbbccf8eeabd92308ae2b4d703ea
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A5C0C9B6A29B8481CA44EB12F48100A7360F7C8BC0F809421EA8E43729DF39C0608B00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: allocator
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3447690668-0
                                                                                                                                                                                                  • Opcode ID: a4eb665c0dab67fc75ab9a7439eff6dc577050ae38ee69520871d7cdb460ba97
                                                                                                                                                                                                  • Instruction ID: d052071ee6f81dbcd094db9f3b5a726cb259aa2d09b8e7d801fdd449fa57d944
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a4eb665c0dab67fc75ab9a7439eff6dc577050ae38ee69520871d7cdb460ba97
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C4C0E96BA29B8591CA44EB16F48101E7765F7D8BC1F90A425EA8E43B29EF28C1558B00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: allocator
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3447690668-0
                                                                                                                                                                                                  • Opcode ID: 5bad480e9dc357d578004b6b74fce4b6a61156974e92647e1283fb4ca5782e32
                                                                                                                                                                                                  • Instruction ID: 1b57b59775dc7cdea6a7389dc9aeb04f2a84e930e0304e91781973fb143d9759
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5bad480e9dc357d578004b6b74fce4b6a61156974e92647e1283fb4ca5782e32
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D6C0C96BA29B8481CA04EB16F48101A7760F7C8BC0F80A421EA8E43729EF38C0508B00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA12A0: HeapAlloc.KERNEL32 ref: 00007FF6EDAA12DE
                                                                                                                                                                                                  • HeapReAlloc.KERNEL32(?,?,00000000,00007FF6EDA9AB33,?,?,?,00007FF6EDAA0633,?,?,?,00007FF6EDAA0529,?,?,?,00007FF6EDAA090A), ref: 00007FF6EDAA5FDD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4292702814-0
                                                                                                                                                                                                  • Opcode ID: 30b325c5f64dc5ebba03079ce99091198ea5fcca70e1dbd4d54066d437e94bf0
                                                                                                                                                                                                  • Instruction ID: a60b05ee8f081274553d68af473616f7d50f26513adc9d172017a228ded00a58
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30b325c5f64dc5ebba03079ce99091198ea5fcca70e1dbd4d54066d437e94bf0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BF01EC12B0E64345F9647669D5407BD12415F847A0F084731EE2EC7AC6FE3EE644420F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF6EDAA1066,?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1241
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4292702814-0
                                                                                                                                                                                                  • Opcode ID: c6224984adebd340dc1ff1ae3343877f5a371577cd2f4111edda332d953b78a8
                                                                                                                                                                                                  • Instruction ID: 8e606aa1571c71f2329489aef94949145f280f0413f6adda4135d8155edace6f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c6224984adebd340dc1ff1ae3343877f5a371577cd2f4111edda332d953b78a8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52F06D56B0920752FE6897A9D9043B512956F89B80F1C4A34CD1EC76CAFD2EE688422F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4292702814-0
                                                                                                                                                                                                  • Opcode ID: 6b8f1f535451d2d7bf55a22bc6c69538f514ce36824696f9be2b27183b9aeb99
                                                                                                                                                                                                  • Instruction ID: 05aeb735b9631c80e54ef8916e97b5f98806bc453cd8a7badb22d9b8a6be2011
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6b8f1f535451d2d7bf55a22bc6c69538f514ce36824696f9be2b27183b9aeb99
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0AF05E13B0D20752FA5456A9D94077511946F847A0F080F34DC3EC72C5FE2EE658821F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 626452242-0
                                                                                                                                                                                                  • Opcode ID: f9f33efb29af4e82fa1a14c2a36846e7b94f7319723002206bfd03bfbf386946
                                                                                                                                                                                                  • Instruction ID: 7d1a56d4369d1367f2f6ea00e5dc1db8ea20941bb2619f2fca47d902ecd712c9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f9f33efb29af4e82fa1a14c2a36846e7b94f7319723002206bfd03bfbf386946
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7D05B32A08E8181D7206B65F40534B67A1F7C4364F504224D5EC4B6E4EF3DC1458B44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4292702814-0
                                                                                                                                                                                                  • Opcode ID: 13d75801f64ec8d3865e874b5fdd0675e1df454be88c95c6e11d4d2af9316d23
                                                                                                                                                                                                  • Instruction ID: f379934d055e471515ce96f8ecfa5cd8ee0dbef8b44164eceef09e0ad856f7c2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 13d75801f64ec8d3865e874b5fdd0675e1df454be88c95c6e11d4d2af9316d23
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2FD0C772A15F84C1C604DF16F840009B7A4FBC8780F509425E68E47734DF38C1658B00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Uninitialize
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3861434553-0
                                                                                                                                                                                                  • Opcode ID: b36b85267c271a7dde5fc24736c32a54d6f5db52bdf33e1abcbd58b17ff23d1d
                                                                                                                                                                                                  • Instruction ID: 3a5245206b203f0613ebc01046c0a658517621be02188c750ce9c93412bff8b6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b36b85267c271a7dde5fc24736c32a54d6f5db52bdf33e1abcbd58b17ff23d1d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 94B01222E19641C1C6043B79E8CA1192220EBAD312FB0C030C148002108E2D41EA8B01
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: GetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0E9B
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsGetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EB0
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: SetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F3B
                                                                                                                                                                                                  • TranslateName.LIBCMT ref: 00007FF6EDAAE57E
                                                                                                                                                                                                  • TranslateName.LIBCMT ref: 00007FF6EDAAE5B9
                                                                                                                                                                                                  • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF6EDA9F3EC), ref: 00007FF6EDAAE600
                                                                                                                                                                                                  • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF6EDA9F3EC), ref: 00007FF6EDAAE638
                                                                                                                                                                                                  • GetLocaleInfoW.KERNEL32 ref: 00007FF6EDAAE7F5
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                                                                                                                                                                                                  • String ID: utf8
                                                                                                                                                                                                  • API String ID: 3069159798-905460609
                                                                                                                                                                                                  • Opcode ID: 0074af3d041b59426d60c948a8777cfc747dce41aa51265abdc6e48ad272092c
                                                                                                                                                                                                  • Instruction ID: 49cfbaecabb47e42851ae5d1c77bbbc4adce814dc20da92140ff77cd2a898f8a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0074af3d041b59426d60c948a8777cfc747dce41aa51265abdc6e48ad272092c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7C917833B0878286EB649F29D4013BD62A4EB44B80F448635DA5C87785FF3EEB51C74A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: GetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0E9B
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsGetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EB0
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: SetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F3B
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0ED1
                                                                                                                                                                                                  • GetUserDefaultLCID.KERNEL32(?,00000000,00000092,?), ref: 00007FF6EDAAF0CC
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EFE
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F0F
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F20
                                                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(?,00000000,00000092,?,?,00000000,?,00007FF6EDA9F3E5), ref: 00007FF6EDAAF0B3
                                                                                                                                                                                                  • ProcessCodePage.LIBCMT ref: 00007FF6EDAAF0F6
                                                                                                                                                                                                  • IsValidCodePage.KERNEL32 ref: 00007FF6EDAAF108
                                                                                                                                                                                                  • IsValidLocale.KERNEL32 ref: 00007FF6EDAAF11E
                                                                                                                                                                                                  • GetLocaleInfoW.KERNEL32 ref: 00007FF6EDAAF17A
                                                                                                                                                                                                  • GetLocaleInfoW.KERNEL32 ref: 00007FF6EDAAF196
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2591520935-0
                                                                                                                                                                                                  • Opcode ID: da2559283d7cbeae9bce4be030612a3ddab1194a7b1485cc5e178dee5eb9292b
                                                                                                                                                                                                  • Instruction ID: 629cd5255ec96e78b1111d36fb78d3e38b9f4ae773278f1c43d244ccd4c3180d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: da2559283d7cbeae9bce4be030612a3ddab1194a7b1485cc5e178dee5eb9292b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 50718A23B0861289FB589B68D8507BC33A0BF08784F444636DE1D97685FF3EAA45C35A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA82B1
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA7974: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6EDAA7988
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA1264: RtlFreeHeap.NTDLL(?,?,?,?,?,?,?,00007FF6ED880543), ref: 00007FF6EDAA127A
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA1264: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF6ED880543), ref: 00007FF6EDAA1284
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA89464: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6EDA89413,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDA8946D
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA89464: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6EDA89413,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDA89492
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA82A0
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA79D4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6EDAA79E8
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8516
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8527
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8538
                                                                                                                                                                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6EDAA8778), ref: 00007FF6EDAA855F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4070488512-0
                                                                                                                                                                                                  • Opcode ID: d50139fecb2627a39c48c1457d34203e11e34cf96ce7aec48478f86a2db775c7
                                                                                                                                                                                                  • Instruction ID: d75351256f1ccbafd60802e909291ec57fbbb9b3c170da598d78c5984f3dd1b0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d50139fecb2627a39c48c1457d34203e11e34cf96ce7aec48478f86a2db775c7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 97D1B063B0825286EB209F3AD8503B97761EF84784F444236EA5DCB795FF3EE541834A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8DAEE0: GetUserDefaultUILanguage.KERNEL32 ref: 00007FF6ED8DAF0E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8DAEE0: LCIDToLocaleName.KERNEL32 ref: 00007FF6ED8DAF2D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • GetLocaleInfoEx.KERNEL32 ref: 00007FF6ED8E84D4
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8E8521
                                                                                                                                                                                                  • GetLocaleInfoEx.KERNEL32 ref: 00007FF6ED8E8554
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyLocaleQueue::StructuredWorkshared_ptr$Info$Char_traitsDefaultLanguageNameUsertype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: unknown
                                                                                                                                                                                                  • API String ID: 378872536-2904991687
                                                                                                                                                                                                  • Opcode ID: e1454bd96659ad0bec1541e2275d5cb48e09357426b2067bc393df3910060181
                                                                                                                                                                                                  • Instruction ID: 2ecbbffd98cd67f8194327727c32b3ec50547be4ac8c2f24f4e3920d2dfce468
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e1454bd96659ad0bec1541e2275d5cb48e09357426b2067bc393df3910060181
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D2414D3361CA8191D660EB25F4517AFB7A0FBC5780F805132E68D83BAAEE2DD548CF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8516
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA79D4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6EDAA79E8
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8527
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA7974: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6EDAA7988
                                                                                                                                                                                                  • _get_daylight.LIBCMT ref: 00007FF6EDAA8538
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA79A4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6EDAA79B8
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA1264: RtlFreeHeap.NTDLL(?,?,?,?,?,?,?,00007FF6ED880543), ref: 00007FF6EDAA127A
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA1264: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF6ED880543), ref: 00007FF6EDAA1284
                                                                                                                                                                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6EDAA8778), ref: 00007FF6EDAA855F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3458911817-0
                                                                                                                                                                                                  • Opcode ID: 59f212a0c473ac315728204136306b882f260071af2b21af5ad007e5b321376f
                                                                                                                                                                                                  • Instruction ID: 1117e35d3cdf859f4dc1d832e7c03a871c8e01715d8628308837b53b0907f56d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 59f212a0c473ac315728204136306b882f260071af2b21af5ad007e5b321376f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3517F73B0864286E710DF3AE8906B97760BF88784F444236EA5DC7695FF3EE540874A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FormatInfoLocaleMessage
                                                                                                                                                                                                  • String ID: !x-sys-default-locale
                                                                                                                                                                                                  • API String ID: 4235545615-2729719199
                                                                                                                                                                                                  • Opcode ID: 5a775d88c650a9e79cb838282cebbc5b6c1244fea282e33ccfb3058c007a43fb
                                                                                                                                                                                                  • Instruction ID: 9917813319392176c52b025b5c71d79fa75b0adbfa5c21425602efc55219d664
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5a775d88c650a9e79cb838282cebbc5b6c1244fea282e33ccfb3058c007a43fb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A01A173B18B81C2E7218B1AF4007BE7BA1EB84794F184035DA5987A94EF3ED644C706
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(?,?,?,?,00007FF6ED8E6E07,?,?,?,?,00007FF6ED8F28B3,?,?,?,?,00007FF6ED8EF611), ref: 00007FF6ED8E6EC9
                                                                                                                                                                                                  • HeapFree.KERNEL32(?,?,?,?,00007FF6ED8E6E07,?,?,?,?,00007FF6ED8F28B3,?,?,?,?,00007FF6ED8EF611), ref: 00007FF6ED8E6ED8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heap$FreeProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3859560861-0
                                                                                                                                                                                                  • Opcode ID: 3d4d90521f567dfdbdf080f6ddfc36047f53224f12ad57a1d32667a58dd6b793
                                                                                                                                                                                                  • Instruction ID: a5d558fd97dd3bc84bc058429b53e664214a09e3112ba6d5d63b7abd244e6c03
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d4d90521f567dfdbdf080f6ddfc36047f53224f12ad57a1d32667a58dd6b793
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3EC08C53F3A682C0D908F7BFA48A09DAAA0AFC9740F90C034F94E43686FC2CC1520A01
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: GetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0E9B
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsGetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EB0
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: SetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F3B
                                                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6EDAAF05F,?,00000000,00000092,?,?,00000000,?,00007FF6EDA9F3E5), ref: 00007FF6EDAAE90E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3029459697-0
                                                                                                                                                                                                  • Opcode ID: 8a374bf536082ffd5969e6104612034dc4bae975a6f00ca86dffa63dd8f5b181
                                                                                                                                                                                                  • Instruction ID: 3fb1d18e489e56b28d7dbb6afd725ef97af74dd9b06df536c68b490a0a436258
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8a374bf536082ffd5969e6104612034dc4bae975a6f00ca86dffa63dd8f5b181
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5811D263F08745CAEB148F2AD0803AC7BA0EB44BA0F444236C669873C0EE39D7D1C745
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: GetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0E9B
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: FlsGetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EB0
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDAA0E8C: SetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F3B
                                                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6EDAAF01B,?,00000000,00000092,?,?,00000000,?,00007FF6EDA9F3E5), ref: 00007FF6EDAAE9BE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3029459697-0
                                                                                                                                                                                                  • Opcode ID: 84a279c0060704da257778070fa102ccaf07cbd384b8046c01115d4fd847b08f
                                                                                                                                                                                                  • Instruction ID: 3af9530c1fc763be95a2b2ccbf8224b123e00ab1e8d13d88d4842c7e53921e17
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 84a279c0060704da257778070fa102ccaf07cbd384b8046c01115d4fd847b08f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9701B573F0828186E7505F1AE4407BDB7A1EB40BA4F458332D669872D4EF7AD691C70A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InfoLocale
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2299586839-0
                                                                                                                                                                                                  • Opcode ID: d8e135536abbf9a5ce7a901c4d7ea1a440c0da467e36a38f40f39a5c037f69d6
                                                                                                                                                                                                  • Instruction ID: e1b735a22ad484484058b2cfdf02a0cb3d58701c78bceb2695a42aa5b207fba5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d8e135536abbf9a5ce7a901c4d7ea1a440c0da467e36a38f40f39a5c037f69d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A2F0586BF3D18282EAA89A5CC29D77C1651AF80301F840136E90BC76D0EE5EE6448747
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6EDA47729
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B8700: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B8797
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsFac_nodeFac_node::_shared_ptrstd::_type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Caption$Description$HelpLink$HelpTelephone$IdentifyingNumber$InstallDate$InstallLocation$InstallSource$Language$LocalPackage$Name$PackageCache$PackageCode$PackageName$ProductID$RegCompany$RegOwner$SKUNumber$Transforms$URLInfoAbout$URLUpdateInfo$Vendor$Version
                                                                                                                                                                                                  • API String ID: 2107158585-605506046
                                                                                                                                                                                                  • Opcode ID: 39498c59c69f8364875a4181624a64dfb364852ab276ad489fc727473e7c5f79
                                                                                                                                                                                                  • Instruction ID: 5861b58ae64498abdba420fd545587d84c4cf25e89126e6788983ccd0da75923
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 39498c59c69f8364875a4181624a64dfb364852ab276ad489fc727473e7c5f79
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C0320D3261DAC2A5DA70DB54E4913EFA364FBC4740F806132D68DC3BA9EE6DD648CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6EDA46AB9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B8700: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B8797
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsFac_nodeFac_node::_shared_ptrstd::_type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: ClassGuid$CompatID$Description$DevLoader$DeviceClass$DeviceID$DeviceName$DriverDate$DriverName$DriverProviderName$DriverVersion$FriendlyName$HardWareID$InfName$Location$Manufacturer$Name$PDO$Signer$StartMode$Status$SystemCreationClassName$SystemName
                                                                                                                                                                                                  • API String ID: 2107158585-2483722238
                                                                                                                                                                                                  • Opcode ID: 4f3fc2cb23be59e252ee8718dfcc6efbe55e0f6e391d42350a3834bd5496ae55
                                                                                                                                                                                                  • Instruction ID: 83c6b43bf3fdb9d0b062140bbfe6997c62c995e09c0725250537d01b590db648
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4f3fc2cb23be59e252ee8718dfcc6efbe55e0f6e391d42350a3834bd5496ae55
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5C320D3261DAC2A5DA709B54E4913EFA364FBC4740F806132D68DC3BAAFE6DD644CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Http$CloseHandle$shared_ptr$Concurrency::details::EmptyOpenQueue::RequestStructuredWorkstd::ios_base::good$Char_traitsConnectCount64ReceiveResponseSendTickTimeoutstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: GET$WinHTTP 1.0
                                                                                                                                                                                                  • API String ID: 967572324-1397384856
                                                                                                                                                                                                  • Opcode ID: a8149d206bd987ce5b2389b5c94f28df9b66ffc54e4ce11c9b6b2b56c415fbe8
                                                                                                                                                                                                  • Instruction ID: 1d95e1993cae923f416e50aa086d8741e662049219d2847a6b09fe8e980922ab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a8149d206bd987ce5b2389b5c94f28df9b66ffc54e4ce11c9b6b2b56c415fbe8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02129E36609BC585E6B08B19F4943EBB3A4F788794F104126DACD87BA9EF7DD094CB04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA3F1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA42C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA340: shared_ptr.LIBCMTD ref: 00007FF6ED8BA468
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9E53
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9E20: shared_ptr.LIBCMTD ref: 00007FF6ED8B9EDC
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902D0E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED9001C0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED9001E2
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902E67
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902EF4
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902F0A
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902F4C
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED902A80: Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FF6ED902AEA
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED902F90
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED9030D9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B8700: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B8797
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::$EmptyQueue::StructuredWork$shared_ptr$ProcessorProxyRoot::SchedulerVirtualchar_traitstype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: SELECT url, title, visit_count, last_visit_time/ 1000000 - 11644473600 AS last_visit_time FROM urls WHERE last_visit_time/ 1000000 - 11644473600 > %d ORDER BY last_visit_time DESC$\Google\Chrome\User Data\Default\History$\HRDR_History.sqlite$d$localappdata$temp
                                                                                                                                                                                                  • API String ID: 2671280029-3846392236
                                                                                                                                                                                                  • Opcode ID: b6cc602adaa3406302afbaa2e55d28eb3516c49df847b8994ac78d71afd9b0d1
                                                                                                                                                                                                  • Instruction ID: f1b436e6380992206a82bdbfd63ffa96a97627cf5f0943ece15a0caed7305ffc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b6cc602adaa3406302afbaa2e55d28eb3516c49df847b8994ac78d71afd9b0d1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A712B43261DAC1A5DA71EB10E8913EFA364FBD5740F801032DA8D83BAAEF6DD544CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8A0D30: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8A0D3E
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89E432
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED89E4A1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::Work$EmptyQueue::Structured$Base::ContextIdentityQueue
                                                                                                                                                                                                  • String ID: ":
                                                                                                                                                                                                  • API String ID: 416282553-3662656813
                                                                                                                                                                                                  • Opcode ID: b80c58c46b5feb5420639f9d11c4b3781ae9b020f6580b2bab8836c9f463eae6
                                                                                                                                                                                                  • Instruction ID: 6daadc0a9be2ba3c99ae374b226e896016a0642019df09a026a5ec9df64a9727
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b80c58c46b5feb5420639f9d11c4b3781ae9b020f6580b2bab8836c9f463eae6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB22D376619BC585DA70DB1AE4943AFB3A1F7C8B80F404126DADD87B69EF3DC0848B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: List$ClassCursorLoadRegister
                                                                                                                                                                                                  • String ID: StartReplace
                                                                                                                                                                                                  • API String ID: 1846139413-3907892786
                                                                                                                                                                                                  • Opcode ID: b5f0ea08ba3b4c49272b3862b565d133f0c8fdfa07b59a91f3596027c0d7089c
                                                                                                                                                                                                  • Instruction ID: 6d1daa286f80a7b11c06218deac95a2b042c1c5ec1caacdc6c4f2932eb70e4c1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b5f0ea08ba3b4c49272b3862b565d133f0c8fdfa07b59a91f3596027c0d7089c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 22A1E176609BC595DB619B19E4903EBB7A0F7C8B80F404032DA8D87BA9EF3DD548CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872290: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8722AD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8ABEF0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8ABF68
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8AE6FB
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8AE7B4
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8AE831
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8AE8AE
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8AE8F9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED899400: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED899561
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Fac_nodeFac_node::_std::_$Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_SchedulerScheduler::_swap
                                                                                                                                                                                                  • String ID: last_visit$title$url$visit_count
                                                                                                                                                                                                  • API String ID: 3419026931-3535738862
                                                                                                                                                                                                  • Opcode ID: bc21412850d5f1c828abe367b7e3e1be931dc869d2f16cdc507a1d1bd993cf1a
                                                                                                                                                                                                  • Instruction ID: fe0c99fa23caaef6b918fb488a3af0585fbe018953678b3aa0a4bc6b9a5714aa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bc21412850d5f1c828abe367b7e3e1be931dc869d2f16cdc507a1d1bd993cf1a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8981413271DAC5A1DA60DB55E8813EBA364FBD4780F805032D68DC3BAAFE6DD604CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: type_info::_name_internal_method$ApisConcurrency::details::Concurrency::task_continuation_context::task_continuation_contextEmptyFac_nodeFac_node::_FileListQueue::StructuredWork__std_fs_code_pagestd::_
                                                                                                                                                                                                  • String ID: ", "$: "
                                                                                                                                                                                                  • API String ID: 576797101-747220369
                                                                                                                                                                                                  • Opcode ID: 7928f5729699b06342b524f3f7ff950a8e90e7c529411d26c9ba4abf5aa930b5
                                                                                                                                                                                                  • Instruction ID: be879709a268fac181705889ddef447bfb1b55d85af7d2d9fa65154e8416a9ff
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7928f5729699b06342b524f3f7ff950a8e90e7c529411d26c9ba4abf5aa930b5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D1612D3362CA8691DA60EB11E8503EFA360FBD4784F804532E68DC7BA9EE7DD505CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CompatibleCreateObjectSelect$BitmapConcurrency::details::_DeleteSchedulerScheduler::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2453095338-3916222277
                                                                                                                                                                                                  • Opcode ID: 2e744ad2f9461efc5dcd54dc25150bc565333c0a64e8148e5ac51807c418ecef
                                                                                                                                                                                                  • Instruction ID: 0f4b08bd8a94fb25f3f815b4cbee3a8adf344345747f86c4871ba8e834897461
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2e744ad2f9461efc5dcd54dc25150bc565333c0a64e8148e5ac51807c418ecef
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46419236608B8586D760DB19E4843AFB7A1F7C8B90F504126EA8D83B68EF7DD448CF05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID: f$f$p$p$f
                                                                                                                                                                                                  • API String ID: 3215553584-1325933183
                                                                                                                                                                                                  • Opcode ID: a5229d74a4eaf89927f07ca804cc49776dcd8313f5dfff05138c8dc7f1d64a09
                                                                                                                                                                                                  • Instruction ID: 934093a46338a3b01829b11f3efe555ec3bc6358239fc44b5f79cf3bcaed27eb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a5229d74a4eaf89927f07ca804cc49776dcd8313f5dfff05138c8dc7f1d64a09
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6B12606BB0C2C386FB205E18D05C7797252EB40754F948435DA9A879C4FF3EEA80CB5A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __crt_scoped_stack_ptrshared_ptr$ErrorInfoStringatomictask
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 442557458-0
                                                                                                                                                                                                  • Opcode ID: e390a1e39f68753c61ab737f25bc1246e670d0f574af2d69ae17ee830270945b
                                                                                                                                                                                                  • Instruction ID: a344dab1613fa10100d5487af236f51dd449a34b0fb6ee1dff7fafe44088087c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e390a1e39f68753c61ab737f25bc1246e670d0f574af2d69ae17ee830270945b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CB713D23A1DA8591DA20EB55E4513AFA764FBC5B80F404032E6CE87BAAEE3DD405CF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2980: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F29AA
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2980: RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,?,00007FF6ED8DC4CF), ref: 00007FF6ED8F29DB
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2980: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00007FF6ED8DC4CF), ref: 00007FF6ED8F29EA
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2980: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00007FF6ED8DC4CF), ref: 00007FF6ED8F2A16
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32 ref: 00007FF6ED8DC64E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run, xrefs: 00007FF6ED8DC38A
                                                                                                                                                                                                  • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 00007FF6ED8DC323
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Close$Char_traitsCreateDeleteOpenValueshared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run$Software\Microsoft\Windows\CurrentVersion\Run
                                                                                                                                                                                                  • API String ID: 1230779726-377293507
                                                                                                                                                                                                  • Opcode ID: e963ab3f74517a8633e58dfdd51229832dcb4b615ab10a70a64e69e117d08ffe
                                                                                                                                                                                                  • Instruction ID: a60023f87ae65d81427f081258d9e20f81b3d93b09d17ce48d3a092fc01a6cd0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e963ab3f74517a8633e58dfdd51229832dcb4b615ab10a70a64e69e117d08ffe
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A8C1E33261EAC194D6B09B15E8803EFB3A4FBC9790F405122DACD83BA9EF2DC154CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Decorator::getTableType
                                                                                                                                                                                                  • String ID: d
                                                                                                                                                                                                  • API String ID: 2700986858-2564639436
                                                                                                                                                                                                  • Opcode ID: 6e06bee34a8a6db327d9fa78b5fc89dbbeaa3398c97d1dd0d01530d079e27994
                                                                                                                                                                                                  • Instruction ID: 2c808c6f69f2f3e3ba11ef8de50d26fe3811c55d207c0fa4f9cd10741aab994f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6e06bee34a8a6db327d9fa78b5fc89dbbeaa3398c97d1dd0d01530d079e27994
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CE814D2361DB8185DB60DB15E49136FB7A0EBC9B90F004031FACE87B6AEE3DD4448B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DNameNode::DNameNode.LIBCMTD ref: 00007FF6ED906DF9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED908390: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED9083AF
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED9083C0: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED9083DF
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED9083F0: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED90840F
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED908450: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED9084F8
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED908420: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED90843F
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Decorator::getTableType$Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$Name$Char_traitsNodeNode::type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: %ws&%ws$GET$HTTP/1.1$WinSock2$evt_type=winsock2
                                                                                                                                                                                                  • API String ID: 2609566735-818248143
                                                                                                                                                                                                  • Opcode ID: 5bc2e0d349c04bd191e93a23267a7ad4f673afc4de1e3eaa06b5a619e420ea14
                                                                                                                                                                                                  • Instruction ID: 9c79af597583aba340a04852867175195973d8bb60ac9d40274f116fbf7dbd14
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5bc2e0d349c04bd191e93a23267a7ad4f673afc4de1e3eaa06b5a619e420ea14
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BDC1F63660DAC195DA709B15F4913EBB3A4FBC4780F405132DACD83BAAEE2DC545CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Mailbox
                                                                                                                                                                                                  • String ID: 5
                                                                                                                                                                                                  • API String ID: 1763892119-2226203566
                                                                                                                                                                                                  • Opcode ID: 44b122818bbba593e6906b35ad2947fb79b07e3f3b7acbd710348e8c60a2b136
                                                                                                                                                                                                  • Instruction ID: 72e83dcc1282a1d8f5eaca6216799674bddf75c6d45ac2dc4a21146430ca302c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44b122818bbba593e6906b35ad2947fb79b07e3f3b7acbd710348e8c60a2b136
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7E613A3261CAC585DA60DB15E4507ABA7A0F7C8794F800236EACD87BACEE6DC645CB40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CompatibleCreateListObject$BitmapDeleteReleaseSelectSleep
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1446415516-0
                                                                                                                                                                                                  • Opcode ID: 9ac64593ff9e5cfe1286ab800f34dfcf4efb9508f58583ae5c4bb61a889af66f
                                                                                                                                                                                                  • Instruction ID: c84320f409df99dbf5d85dcefdeac1f065c3ae39f17142f79f8430af5fe40509
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9ac64593ff9e5cfe1286ab800f34dfcf4efb9508f58583ae5c4bb61a889af66f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9551D937609B85C5EA60DB19E89436AB7B0F7C8B90F500135DA8E87BA8DF3DD549CB00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED920991
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::details::_SchedulerScheduler::_shared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: /p.gif$ev.pcapp.store$pcdetails$process_add$process_delete
                                                                                                                                                                                                  • API String ID: 3970144725-3242555254
                                                                                                                                                                                                  • Opcode ID: e2acbabeb27e0d1e3320052bd2634f4201eeb5cc8675e6363a85e8afcf851882
                                                                                                                                                                                                  • Instruction ID: 36de0bff5009aef27b00f208ad9ad5f0d7597875c369f7aae3cc1fda4fff6206
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e2acbabeb27e0d1e3320052bd2634f4201eeb5cc8675e6363a85e8afcf851882
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B251C336609BC6A5DAA09B14F4913DBB364FBC4740F805132E6CD83BA9EF6DD548CB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$CurrentDirectory$EnvironmentVariable_invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID: :
                                                                                                                                                                                                  • API String ID: 3543485053-336475711
                                                                                                                                                                                                  • Opcode ID: c46482545327be9b10bc8238fafa0fcd1ee0a590b6ec4000dfa4fe7dd03f6207
                                                                                                                                                                                                  • Instruction ID: 87d0bdd72c28be79846403663a48fa961ea38a0257bbcad5314c7c5da97bf191
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c46482545327be9b10bc8238fafa0fcd1ee0a590b6ec4000dfa4fe7dd03f6207
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA418227B0CB8185E7249B69F44437A77A4FF84790F440135EA8D87695EF3EE6058B06
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0E9B
                                                                                                                                                                                                  • FlsGetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EB0
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0ED1
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0EFE
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F0F
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F20
                                                                                                                                                                                                  • SetLastError.KERNEL32(?,?,00000001,00007FF6EDA902C1,?,?,?,?,?,?,?,?,00007FF6EDA8908E,?,?,?), ref: 00007FF6EDAA0F3B
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value$ErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2506987500-0
                                                                                                                                                                                                  • Opcode ID: 3f95740e71629d156b1c8664d9afbe685b46ca27b8968145abc5edc65d86a042
                                                                                                                                                                                                  • Instruction ID: a1bb848e7e694ae0a41793766874201b219a074f6efb07b0e520587e9eb15812
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3f95740e71629d156b1c8664d9afbe685b46ca27b8968145abc5edc65d86a042
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 54216D23F0D64246F9686769D54137962428F44BB0F144735E83DC76CAFE2FEA41420F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 4f560443b9a293dd733b9be1daee009555be006c5b7e85f94a506ee5dca3d320
                                                                                                                                                                                                  • Instruction ID: e199794d4223edba1dad6b065b1dfbe3ee6979f5ddf820f584e0c4b1e33e54ac
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4f560443b9a293dd733b9be1daee009555be006c5b7e85f94a506ee5dca3d320
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4351425372DA5A41EE40871AE48163AA360FBD4B48F645032F98FCB3E5FE3DE4459705
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00007FF6EDA6699D
                                                                                                                                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF6EDA61FB2,?,?,?,00007FF6ED86E829), ref: 00007FF6EDA669BC
                                                                                                                                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF6EDA61FB2,?,?,?,00007FF6ED86E829), ref: 00007FF6EDA669DE
                                                                                                                                                                                                  • sys_get_time.LIBCPMT ref: 00007FF6EDA669F9
                                                                                                                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF6EDA61FB2,?,?,?,00007FF6ED86E829), ref: 00007FF6EDA66A1F
                                                                                                                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FF6EDA61FB2,?,?,?,00007FF6ED86E829), ref: 00007FF6EDA66A37
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AcquireExclusiveLock$CurrentThreadsys_get_time
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 184115430-0
                                                                                                                                                                                                  • Opcode ID: a47a0f3a140f22f6f1c2823ef7346fe511b542ce4fb8ce901a0362af8777215f
                                                                                                                                                                                                  • Instruction ID: 9743cdf05ed6b81916cdc0f9e65f23a4b8dba0bd1e1bae307d8f82ca269c5be8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a47a0f3a140f22f6f1c2823ef7346fe511b542ce4fb8ce901a0362af8777215f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12414873A28642C6EB248F1CD44033C7370EB64B44F488475E6AD83698EF3EEA51CB06
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1013
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1049
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1076
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1087
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA1098
                                                                                                                                                                                                  • SetLastError.KERNEL32(?,?,?,00007FF6EDA89589,?,?,?,?,00007FF6EDAA1298), ref: 00007FF6EDAA10B3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value$ErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2506987500-0
                                                                                                                                                                                                  • Opcode ID: 093114a9f2d24b45c81999d8dbf461db7dbfee7099e6b8a7d182c03f7acd1818
                                                                                                                                                                                                  • Instruction ID: 1c4b9e942d913fdb927c2ea03c0a5c8e8dd1c6cc3f96dfc95e13c79622dce5aa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 093114a9f2d24b45c81999d8dbf461db7dbfee7099e6b8a7d182c03f7acd1818
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B8115B22F0C69256FA586369D5813B972425F847B0F004B34D83EC77D6FE2FE641820B
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • OpenEventW.KERNEL32 ref: 00007FF6ED88CBED
                                                                                                                                                                                                  • SetEvent.KERNEL32 ref: 00007FF6ED88CC13
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2EE0: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2F1D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2EE0: RegSetKeyValueW.ADVAPI32 ref: 00007FF6ED8F2F8A
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2EE0: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2F99
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2EE0: RegCloseKey.ADVAPI32 ref: 00007FF6ED8F2FD4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr$CloseEvent$Char_traitsCreateOpenValuetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: DEBUGSCREEN_EVENT$LastID$LastTime
                                                                                                                                                                                                  • API String ID: 2367785588-2970118753
                                                                                                                                                                                                  • Opcode ID: 8c9268aaa7a399063db3cb76e1d8ac32ca5c6b4b30719342c10f2840fe20a387
                                                                                                                                                                                                  • Instruction ID: b8562a23f10c711cdb6e7b8453e3408298f2cadcedba0a4ac4a3f1eb2055c19b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8c9268aaa7a399063db3cb76e1d8ac32ca5c6b4b30719342c10f2840fe20a387
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EDA1BE36609BC194DAB19B15E4803EBB3A4FBC8780F405126DACD83BA9EF3DC554CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED910743
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::details::_SchedulerScheduler::_shared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: pcdetails$spots$spots_list_is_empty$wlanspots
                                                                                                                                                                                                  • API String ID: 3970144725-459635628
                                                                                                                                                                                                  • Opcode ID: 9e29bf0bc2d919ec013e679566c7b1d6562db9e311d387f3b1e3a8add6a20a18
                                                                                                                                                                                                  • Instruction ID: 70f69cee865f4580f4d4c7f793f79f604d7799d6f27aae13f13c88835782639c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9e29bf0bc2d919ec013e679566c7b1d6562db9e311d387f3b1e3a8add6a20a18
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FD51DD32619BC6A5DA609B14F4813DBB3A4FBC5780F805122E68D83BA9EF6DD548CB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • shared_ptr.LIBCMTD ref: 00007FF6ED89E3CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8A28D0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8A28DE
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89E432
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED89E4A1
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED89E50F
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89E5D8
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED89E647
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED89E6B5
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89E76C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::Work$Base::ContextEmptyIdentityQueueQueue::Structured$shared_ptr
                                                                                                                                                                                                  • String ID: ":
                                                                                                                                                                                                  • API String ID: 1420614328-3662656813
                                                                                                                                                                                                  • Opcode ID: 0c775d62989557703b59997576e5846b07d2e6948ec0cda0981f8588e2bfa6e3
                                                                                                                                                                                                  • Instruction ID: f2da17093547af94533ca1767800f4d37b49a52857679ce096040eba1e683b1d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c775d62989557703b59997576e5846b07d2e6948ec0cda0981f8588e2bfa6e3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9441E436619BC985CA70DB16E4943AFB3A1F7C9B80F404026DACD83B6AEF3DC0408B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __ExceptionPtrDestroy.LIBCMTD ref: 00007FF6ED8CC438
                                                                                                                                                                                                  • __ExceptionPtrDestroy.LIBCMTD ref: 00007FF6ED8CC456
                                                                                                                                                                                                  • __ExceptionPtrDestroy.LIBCMTD ref: 00007FF6ED8CC474
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED89D990: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89DA18
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  • __ExceptionPtrDestroy.LIBCMTD ref: 00007FF6ED8CC495
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Exception$Destroy$Concurrency::details::EmptyFileHeaderQueue::RaiseStructuredWorkchar_traits
                                                                                                                                                                                                  • String ID: type must be number, but is
                                                                                                                                                                                                  • API String ID: 1470042880-1272216085
                                                                                                                                                                                                  • Opcode ID: d7531906061f3276da8aff9ed886b3eca008774970c527c16f02ff7bfcb830fd
                                                                                                                                                                                                  • Instruction ID: d3e0613ef4e0d91692af6007a24ec53a9b168051d07ffd10149b24b7db0ca734
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d7531906061f3276da8aff9ed886b3eca008774970c527c16f02ff7bfcb830fd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 40315D7390CA8291D660DB14E4503AF7760FBC4780F548132E68E87BA9EF2ED445CB0A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • std::bad_exception::bad_exception.LIBCMTD ref: 00007FF6ED8F266E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8D6DD0: std::bad_exception::bad_exception.LIBCMTD ref: 00007FF6ED8D6DE8
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32 ref: 00007FF6ED8F2685
                                                                                                                                                                                                  • HeapAlloc.KERNEL32 ref: 00007FF6ED8F2694
                                                                                                                                                                                                  • std::bad_alloc::bad_alloc.LIBCMTD ref: 00007FF6ED8F26AB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heapstd::bad_exception::bad_exception$AllocExceptionFileHeaderProcessRaisestd::bad_alloc::bad_alloc
                                                                                                                                                                                                  • String ID: length
                                                                                                                                                                                                  • API String ID: 760574106-25009842
                                                                                                                                                                                                  • Opcode ID: 7dbd99f512595a5e1a4749f653f754d1e6fb90a8cf32e3c67131ec518ad9f066
                                                                                                                                                                                                  • Instruction ID: ee2ffb29ead904351a8dd302d9a330b4eb156a4e4cddbe792bb04bc2cb5b7e50
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7dbd99f512595a5e1a4749f653f754d1e6fb90a8cf32e3c67131ec518ad9f066
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CA212172A18A4586DA20DB19E45136EB7A0FBC8748F504135E68D877A9FF3DD241CF05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: fpos
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1083263101-0
                                                                                                                                                                                                  • Opcode ID: 7b945ed7b90f68277aa6d8d93e7e73dfb76088bfad2ad43f88c397df4c89518c
                                                                                                                                                                                                  • Instruction ID: d1a618b4de8483b1192eee8696b8a38595798e33ef9aa929b7d2dad414ff8027
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b945ed7b90f68277aa6d8d93e7e73dfb76088bfad2ad43f88c397df4c89518c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6EA1192760CA8585EA71DB15E44036FA7A0F784794F540231EADEC7BE9EF2EE444CB06
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _set_statfp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1156100317-0
                                                                                                                                                                                                  • Opcode ID: ad73b3c2f3ca7992f3abbfc31898903a5543440c7c2d8da51a77aa6b5f9d88a6
                                                                                                                                                                                                  • Instruction ID: 83d0e9e5fbbca87f07e6e11efcf28e2cc752d4cdbad00e43f42971f13767dde0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ad73b3c2f3ca7992f3abbfc31898903a5543440c7c2d8da51a77aa6b5f9d88a6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 13812913B09A4685F6328B3CE60037E6752BF44354F046331ED4EA7595FF3EEAA1860A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_$Decorator::getTableType
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1823342465-0
                                                                                                                                                                                                  • Opcode ID: dea017444eea074c7099d0a05d7cd5d3c92429df5b37ab07162c35d662b37fed
                                                                                                                                                                                                  • Instruction ID: d196933f6dfe99f82ae8c02a739ea4dac8b2bcb22dee9a7391d9bd96d67cfa79
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dea017444eea074c7099d0a05d7cd5d3c92429df5b37ab07162c35d662b37fed
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5551252360DAC185D6609B15F4903AFB7A4FB84780F804032E6CDC3BAAEF2ED454CB46
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: char_traits$Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valuewmemset
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1140703174-0
                                                                                                                                                                                                  • Opcode ID: 2d85972f5aa94deb3566bb0615c426f035448c6c400c1f5a74a4639796461d74
                                                                                                                                                                                                  • Instruction ID: 80e5ebbe21582909e2d956ab2787bac907ff097e99c778e5ed20592e2fdacf26
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d85972f5aa94deb3566bb0615c426f035448c6c400c1f5a74a4639796461d74
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 49411F3762DB8182CA10DB15F48126FA7A0FBC9B94F501536EA8D83B69EF3DD500CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 459529453-0
                                                                                                                                                                                                  • Opcode ID: 6c203c11152ae74cf2821e48898f7f41c22a656f704c05c17429b40623adf8d6
                                                                                                                                                                                                  • Instruction ID: c707de80d4401cebdd283187705f357e8f6c67a9a8012f88a0e94fd786cc8495
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6c203c11152ae74cf2821e48898f7f41c22a656f704c05c17429b40623adf8d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EB31C063B09B4291EB059B1DD8403797760EB44BA0F180132EE1DC76E9FF7EE542830A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 459529453-0
                                                                                                                                                                                                  • Opcode ID: 2ebece95495b42b0c0b0d886b9181fd70e0bdb863da3b9daf7c46256c2f82f99
                                                                                                                                                                                                  • Instruction ID: 6a0b4e0d97a135125cee78ef7439cef5fba21a91d3c0b7995b36680352f45440
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2ebece95495b42b0c0b0d886b9181fd70e0bdb863da3b9daf7c46256c2f82f99
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0831C123B08A4291EB159B1DD8403797760EB44BA0F180532DE1DC76E9FF7FE682930A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 459529453-0
                                                                                                                                                                                                  • Opcode ID: 3502fb0df1094f9bc0e039e8f9919757af7fd45c0e4082c25e146da99bc1e1e1
                                                                                                                                                                                                  • Instruction ID: d630d8f9dd686f5f2434d888ca817ba26a9f58fef8ca992a39ac1c0f1269968d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3502fb0df1094f9bc0e039e8f9919757af7fd45c0e4082c25e146da99bc1e1e1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 41319C23B08A42D1EE059B19D8443B97760FB45BA4F181132DA1DC76E9FF7EE642D30A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 459529453-0
                                                                                                                                                                                                  • Opcode ID: 54acca4439d76a87db506fadf1a38f419e16bf2eec0111c9418afd3767e16f00
                                                                                                                                                                                                  • Instruction ID: b09e25eea537cd3bb1133f954f7e9f958a2edbf0856ce1c0a42657cb9bfc8192
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 54acca4439d76a87db506fadf1a38f419e16bf2eec0111c9418afd3767e16f00
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7531E223B08A42D1EF059F19D9443787360EB44BA0F181131DA1EC76E9FF7EE502930A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 459529453-0
                                                                                                                                                                                                  • Opcode ID: 42222f856d49f883134fc2121ff3d0b4d94212fc7c3c45af6e299a9cfb62608e
                                                                                                                                                                                                  • Instruction ID: 54fb07de42b096370c4faaf030829324ebef0f72766cc4da43fdd627b155bf36
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 42222f856d49f883134fc2121ff3d0b4d94212fc7c3c45af6e299a9cfb62608e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8431AF23B08A4291FB059B1AD4443B97760EB44BA0F180532DA1CC76EAFF7EE542830A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$Concurrency::details::_CountCriticalHandleInsertItemLock::_ReentrantRemoveScoped_lockScoped_lock::~_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 623932097-0
                                                                                                                                                                                                  • Opcode ID: 1a43c16f4e6dd5afa490d5c304e4115d57bd001bd26757fce50a4acd5d1a3739
                                                                                                                                                                                                  • Instruction ID: a59bda1c376b271d0a5c306cd127838ce1c816b04a9214c568c9aba226d738a7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1a43c16f4e6dd5afa490d5c304e4115d57bd001bd26757fce50a4acd5d1a3739
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0131D637A19B858AD650DB1AF48032EB7A4F7C9B90F500035EA8E83B69EF7DD4408B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: swap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 630424929-0
                                                                                                                                                                                                  • Opcode ID: b1456921641b39926f32543fe295c87bdc323f43b46785147537297e5d9a20ff
                                                                                                                                                                                                  • Instruction ID: ea2fe8010679272c85a89b08db23d992e359afd096baf4b0607b721fc4bdaf1a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b1456921641b39926f32543fe295c87bdc323f43b46785147537297e5d9a20ff
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3711E252F3968542DE40D75AE09526F9350EFC1BC8B406436FA8F8BB6BDE2CC0518B48
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _set_statfp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1156100317-0
                                                                                                                                                                                                  • Opcode ID: 7783eb11ce6aeccc52dcaec98f4ae3c4f4dee0f9b344835f90093a4934bb58c0
                                                                                                                                                                                                  • Instruction ID: 5db1ccd9fdf725e442088e55ea24bed6faf533062fd514b7da6c99a01c321c53
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7783eb11ce6aeccc52dcaec98f4ae3c4f4dee0f9b344835f90093a4934bb58c0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F511C123F08A1345F6582A7CE44937A04416F65774F460B36EA7ECF3D6BE1EAA80450A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FlsGetValue.KERNEL32(?,?,?,00007FF6EDA890D7,?,?,00000000,00007FF6EDA89372,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDAA10EB
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA890D7,?,?,00000000,00007FF6EDA89372,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDAA110A
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA890D7,?,?,00000000,00007FF6EDA89372,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDAA1132
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA890D7,?,?,00000000,00007FF6EDA89372,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDAA1143
                                                                                                                                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF6EDA890D7,?,?,00000000,00007FF6EDA89372,?,?,?,?,?,00007FF6EDA892FE), ref: 00007FF6EDAA1154
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3702945584-0
                                                                                                                                                                                                  • Opcode ID: f797eb4005134b0d772cb7cebd6898af6a2b9294f431481cc798af8fe7ec449b
                                                                                                                                                                                                  • Instruction ID: dfe9aca61d6a300b20d043bf7703503a224219f9b638a68a8095eca9583a9687
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f797eb4005134b0d772cb7cebd6898af6a2b9294f431481cc798af8fe7ec449b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F511AC22F0C74212FA589369E9417B961824F807F0F440B39E83DC77D6FE2EE641820A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3702945584-0
                                                                                                                                                                                                  • Opcode ID: 81709acc6d2517d41a84a0db2d7b2956bab8655c2b0c346f14b1efcddb4a6db4
                                                                                                                                                                                                  • Instruction ID: a947f843c7eacdf2e4c69d1fc638bda8df942982d19d7936d24e6c38f871abf6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 81709acc6d2517d41a84a0db2d7b2956bab8655c2b0c346f14b1efcddb4a6db4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DD11F522F4A24246F968A2A998517BD22424F41770F040B35E93DDB2D6FE2EB641424F
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$Concurrency::details::_CreateCriticalLock::_QueryReentrantScoped_lockScoped_lock::~_Value
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2355983633-0
                                                                                                                                                                                                  • Opcode ID: bdbec7d9fffe552abd3ef129c59d30dc15dcc3f7ad03ea03f554f749f04313f0
                                                                                                                                                                                                  • Instruction ID: 8f0a0b9c7fd36831c908fbbbfe5d0043915cfbfaa80374cbbcba192dfbaec6eb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bdbec7d9fffe552abd3ef129c59d30dc15dcc3f7ad03ea03f554f749f04313f0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1021193262DA8186D6509F14F48036FB3A0FBC8B90F601131FA8E87B28EF3EC5558B04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Mpunct$std::ios_base::width
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 1355946870-2766056989
                                                                                                                                                                                                  • Opcode ID: 535871e10ffb8f10dd0b76bb41f178b27f3f56858f02db692da97f54d52078ee
                                                                                                                                                                                                  • Instruction ID: 26e26a6c15e4a9c35e9ed700d57e3f4b0a073098505a9f70897ca7d130a1bde1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 535871e10ffb8f10dd0b76bb41f178b27f3f56858f02db692da97f54d52078ee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DA12343660DAC585DAB09B15E8943EFA7A1F7C8780F845032DACD83BA9EE3DD545CB00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                                                                                                                  • API String ID: 3215553584-1196891531
                                                                                                                                                                                                  • Opcode ID: 180ec173850128433fba9196c46aea064637f9fe1acbecad26fe87283bc0d138
                                                                                                                                                                                                  • Instruction ID: 02e8080decfc655a8c6ad88d2f6d1f0c726891023d13e24bceccad708a69d9ba
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 180ec173850128433fba9196c46aea064637f9fe1acbecad26fe87283bc0d138
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D0818233F0C2028DF6754E6DC15037926A0AB11B48F55823DEA0DD7699EFAFAA41970B
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::$Affinity::operator!=EmptyHardwareQueue::StructuredWorkshared_ptr
                                                                                                                                                                                                  • String ID: /
                                                                                                                                                                                                  • API String ID: 842898399-2043925204
                                                                                                                                                                                                  • Opcode ID: 36648b9cdb120aaf0761ae857404f33d96ed3a163e9d65ac5edf0deee7bd392e
                                                                                                                                                                                                  • Instruction ID: ae503b771a619c2ecef22a8d8e51e87b60877dd72004a31c1cf2f95db8f4f0c6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 36648b9cdb120aaf0761ae857404f33d96ed3a163e9d65ac5edf0deee7bd392e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 29611B2361C9C291D6A19B14E4903BFA760FBD9344F904532E2CDC7BEAEE2DD645CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8B9A30
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED89D2F9
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED871880: UnDecorator::getVbTableType.LIBCMTD ref: 00007FF6ED8718C1
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED91D3C0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED91D3E7
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED91D3C0: HandleT.LIBCPMTD ref: 00007FF6ED91D3F6
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED91D3C0: std::ios_base::good.LIBCPMTD ref: 00007FF6ED91D432
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED91D3C0: std::ios_base::good.LIBCPMTD ref: 00007FF6ED91D446
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$shared_ptr$std::ios_base::good$Char_traitsConcurrency::details::_CriticalDecorator::getHandleLock::_ReentrantScoped_lockScoped_lock::~_TableTypetype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: /p.gif$bhist$ev.pcapp.store
                                                                                                                                                                                                  • API String ID: 200462385-3993023549
                                                                                                                                                                                                  • Opcode ID: b8ddb0e84a390ac57150a2713f891022e8d4bd32d7fba5ca781ce27481830d12
                                                                                                                                                                                                  • Instruction ID: 96f0cc3fd6e1ccdb3c6d107993c4bd148c73c4ffaed09d3abe8e3584619bf804
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b8ddb0e84a390ac57150a2713f891022e8d4bd32d7fba5ca781ce27481830d12
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA71C036609BC1A4DAB09B15F4903EBB3A4FBC8780F405132E6CD83BA9EF29C545CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Mailbox
                                                                                                                                                                                                  • String ID: 5
                                                                                                                                                                                                  • API String ID: 1763892119-2226203566
                                                                                                                                                                                                  • Opcode ID: 6aea4beceeb193ee61f2423917782bde622517718429cf48cb4b47926f765d30
                                                                                                                                                                                                  • Instruction ID: 9d9ff1542e25da1ba5de927cef3f336071781e4ab94e2937bfd7141c5560356e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6aea4beceeb193ee61f2423917782bde622517718429cf48cb4b47926f765d30
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 31513C3260DAC585DA70DA15E4503ABA7A0F7D9794F840236EACD83FACEE6DC645CB00
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED904637
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • d, xrefs: 00007FF6ED9046BE
                                                                                                                                                                                                  • SELECT moz_places.url, moz_places.title, moz_places.visit_count, moz_historyvisits.visit_date/1000000 AS visit_time FROM moz_places JOIN moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id AND visit_time/1000000 > %d ORDER BY visit_time DESC, xrefs: 00007FF6ED9045BE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID: SELECT moz_places.url, moz_places.title, moz_places.visit_count, moz_historyvisits.visit_date/1000000 AS visit_time FROM moz_places JOIN moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id AND visit_time/1000000 > %d ORDER BY visit_time DESC$d
                                                                                                                                                                                                  • API String ID: 1865873047-3669390177
                                                                                                                                                                                                  • Opcode ID: 6b906efd43eb21c5854a532d8cbfd2aa9a4c64f45b0cf64af96a8d463d5c4b57
                                                                                                                                                                                                  • Instruction ID: 545490d0dcdee7ad0a8795d585417ccb1274e7053667ccbb29c50ed4d112131b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6b906efd43eb21c5854a532d8cbfd2aa9a4c64f45b0cf64af96a8d463d5c4b57
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F510A3361CA8291E660EB11E8913EFB364FBC5780F501032E68D83AAAFF6DD505CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA61E58: QueryPerformanceFrequency.KERNEL32(?,?,?,?,00007FF6ED88CCB1), ref: 00007FF6EDA61E6D
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA61E3C: QueryPerformanceCounter.KERNEL32(?,?,?,?,00007FF6ED88CCBB), ref: 00007FF6EDA61E45
                                                                                                                                                                                                  • _Subatomic.LIBCONCRTD ref: 00007FF6ED88CD0E
                                                                                                                                                                                                  • _Subatomic.LIBCONCRTD ref: 00007FF6ED88CDAA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: PerformanceQuerySubatomic$CounterFrequency
                                                                                                                                                                                                  • String ID: d
                                                                                                                                                                                                  • API String ID: 3831891851-2564639436
                                                                                                                                                                                                  • Opcode ID: 7416a04ee3988a1b49082d3625b553ad268f0f941abadb8863d513c942ed20aa
                                                                                                                                                                                                  • Instruction ID: be5de5d71122637c16f0b62929982361dd21504ca91a8b67deca74d4b089c79f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7416a04ee3988a1b49082d3625b553ad268f0f941abadb8863d513c942ed20aa
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2E31F522619B8582DA70DB19F44136BB7A5F7C4794F005136E6CE87BA9EF3DD1048B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_type_info::_name_internal_method
                                                                                                                                                                                                  • String ID: <U+%.4X>
                                                                                                                                                                                                  • API String ID: 1503085150-1919636860
                                                                                                                                                                                                  • Opcode ID: 59e48bf6ab7b5b65980ac2c844a35d74a1602ed7c88e9ab8306714c1c04f6b5e
                                                                                                                                                                                                  • Instruction ID: b9dbd1f14970ae067bd9484cad71ac89373d100869381852ffb24ffa586d5301
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 59e48bf6ab7b5b65980ac2c844a35d74a1602ed7c88e9ab8306714c1c04f6b5e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1C314A2362DA8595D660DB15F8403AFB7A0FBC8784F400532F6CD83BAAEE2DD6048B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::cancellation_token::_FromImpl
                                                                                                                                                                                                  • String ID: at line $, column
                                                                                                                                                                                                  • API String ID: 2278334151-191570568
                                                                                                                                                                                                  • Opcode ID: 24bb686d2cd62906f6aab745782c1f2094ac1e4636cc1f861a82bd7af10581fc
                                                                                                                                                                                                  • Instruction ID: e8f6933afd79a2225e845bce01c6389e434786cd5c642a3947f3efd25f10b7fc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 24bb686d2cd62906f6aab745782c1f2094ac1e4636cc1f861a82bd7af10581fc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A131E77260DB8591DA60DB19F48139BB7A0F7C9780F505126EACD83B69EF3DD145CB40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2718003287-0
                                                                                                                                                                                                  • Opcode ID: 96484d5acf162596c52b181ba46f8f1f275bcdd421ffa09ccf8b7b833c740a6b
                                                                                                                                                                                                  • Instruction ID: 0f7e0a3b64653bc908e03941b5ed0106312c06732ee1ff70eff2d8dfcea02bb2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 96484d5acf162596c52b181ba46f8f1f275bcdd421ffa09ccf8b7b833c740a6b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E9D10633B18A8589E711CF79C4502BC37B5FB44B98B084236CE5D9BB99EE3AD606C705
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: swap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 630424929-0
                                                                                                                                                                                                  • Opcode ID: dab1c2567f51b9bb8b3c6f34461d974b742dca953393f99ba06ca028ae785a1e
                                                                                                                                                                                                  • Instruction ID: e549480a5e93211d5ea1e1f9bbd74512b0cdeeee5456d550401793c6d4cbb2ab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dab1c2567f51b9bb8b3c6f34461d974b742dca953393f99ba06ca028ae785a1e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B7D11C6760EAC484EB70DB16E8517AFA760FBC5B84F104226DACD87B5ADE3DC044CB49
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00007FF6EDAB3611), ref: 00007FF6EDAA6F30
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00007FF6EDAB3611), ref: 00007FF6EDAA6FBB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ConsoleErrorLastMode
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 953036326-0
                                                                                                                                                                                                  • Opcode ID: 94583fae22a5779a865ff3301be22cf641a4d12dabff0077b2ba564d4492062a
                                                                                                                                                                                                  • Instruction ID: fc7cb57f66aca598c2f6bd55f5cb46a6c4558e36ecd608d31e1de8b92674f1e1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 94583fae22a5779a865ff3301be22cf641a4d12dabff0077b2ba564d4492062a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AD91B563F08A5285F7618F69D4407BD2BA0FB04788F184239DE0E97A94FF3AD546C70A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkshared_ptr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2155007778-0
                                                                                                                                                                                                  • Opcode ID: 4d847e42fc2989dc9aa906f24e9b415549a601ee041754a045ab72c1f2660e1d
                                                                                                                                                                                                  • Instruction ID: b401777fc32dde27463214a4a4738d5ee23704a4e70739338b7a1fa46b84e987
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4d847e42fc2989dc9aa906f24e9b415549a601ee041754a045ab72c1f2660e1d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1D91E636609AC595EA70DB11E8513EFA365F7C8780F804032EACD83BA9EF2DD545CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWorkfrexplswprintf
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2911421839-0
                                                                                                                                                                                                  • Opcode ID: f459c740c5c1a56b47ca0e2b38a3f3d911eb8d19bee9d19a223aaebf9f6bf533
                                                                                                                                                                                                  • Instruction ID: d134ca4529d466af3daf6bbe1b3aebf53522b1f25d182763ac7daa01661701bd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f459c740c5c1a56b47ca0e2b38a3f3d911eb8d19bee9d19a223aaebf9f6bf533
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9D713537A0DAC589D7609B25E4413ABB7A0FBC5390F504136EACD83B9AEE2DD584CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: fpos
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1083263101-0
                                                                                                                                                                                                  • Opcode ID: 84e5dc04051c97e1429c07ac32a997d7f3784d6b5907c0d86a310c2bd9ec1a9f
                                                                                                                                                                                                  • Instruction ID: 75775619c5daf290fcf64042408b1b9538f5d2fc2524c5eb40765c4e77d11904
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 84e5dc04051c97e1429c07ac32a997d7f3784d6b5907c0d86a310c2bd9ec1a9f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 56611F27A1CA8186EA61DB29E44136FA7A0F7C4794F540231EADDC7BE9DF2ED440CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyIs_slash_oper::operatorQueue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 569396444-0
                                                                                                                                                                                                  • Opcode ID: ecbbd04fe9f7137433b7baf393d29992cf48019825fd2f37f84fb4daa2c2848c
                                                                                                                                                                                                  • Instruction ID: f9d8a51b28a5d755d3a77fbfb16dab9880bf3f7580bffb8582185aaa1fa94410
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ecbbd04fe9f7137433b7baf393d29992cf48019825fd2f37f84fb4daa2c2848c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7161092361DA8681DA50EB15F0903AFB7A5EBC5784F501032FACE87BA9EE3DD545CB01
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED8D30B6
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED8D30DD
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED8D3113
                                                                                                                                                                                                  • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF6ED8D313A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2443641946-0
                                                                                                                                                                                                  • Opcode ID: b05854876c60b3b29a878b536dd828c4e10f250e23f5b0d70d99fc37f25467c0
                                                                                                                                                                                                  • Instruction ID: 663330d07c89da73dfe763d22ac8fb309988f005a2e5b03c30bd228d37ed051b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b05854876c60b3b29a878b536dd828c4e10f250e23f5b0d70d99fc37f25467c0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A341E723609A8691D660EB15E4803AFB7B0FBD4784F404132E6CD83BAAEF3DD545CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$CreateValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1009429713-0
                                                                                                                                                                                                  • Opcode ID: 52ed2ea9a2db60ea7fe1caf6838f313ce1859de684b0871257308ceba615e435
                                                                                                                                                                                                  • Instruction ID: 0c2369edaa815d229ceae29d9c547a1b908914294ee8b81fb1c03428e6313b1d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 52ed2ea9a2db60ea7fe1caf6838f313ce1859de684b0871257308ceba615e435
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0931FC2261DA8186E750DB25F45136FA7A0FBC5B81F502032F7CEC7BA9EE2ED4458B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __std_fs_convert_wide_to_narrow$Concurrency::details::EmptyListQueue::StructuredWorkstd::make_error_code
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3856960188-0
                                                                                                                                                                                                  • Opcode ID: e30377120668411caa25c90ea83be91f369d59f483f6cabc7bccb9b5be9a9300
                                                                                                                                                                                                  • Instruction ID: 321c82aecb9ec69189eb4f8f62e7d0ade0883cec1a29743bd1e2ab3a5ed45924
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e30377120668411caa25c90ea83be91f369d59f483f6cabc7bccb9b5be9a9300
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5131F83262968185E760DB15E4413AFB760FBC5780F401136EA9D87BAAEF3DD800CF45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __std_fs_convert_narrow_to_wide$Concurrency::details::EmptyListQueue::StructuredWorkstd::make_error_code
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 108412505-0
                                                                                                                                                                                                  • Opcode ID: 0deffbd2b8a959b46a88e39b2b06825aa71ec8bb4ebc5851b86794d0ece41ddb
                                                                                                                                                                                                  • Instruction ID: aae8f3392108c4e26620d1fa3a44df58c26a11dcfce1142b485d02933d393cb5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0deffbd2b8a959b46a88e39b2b06825aa71ec8bb4ebc5851b86794d0ece41ddb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6B31EA3262968195D660EB15E4417AFB7A0FBC5780F401136E68DC7BAAEF3DD8008F45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 228209623-0
                                                                                                                                                                                                  • Opcode ID: 9a0459c7ca29af22866f37908ae06ecbfaabba6eb986bfb4d9a22b546ce79706
                                                                                                                                                                                                  • Instruction ID: 410985f5c625fa3427edbdd4ce90695e9995c4d21424835c37f1788b7ec53c20
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a0459c7ca29af22866f37908ae06ecbfaabba6eb986bfb4d9a22b546ce79706
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72211E23A2DA4581DA50DB15E48026FB7A0FB847A4F501132F69E83BE9EE3DD540CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2DFE
                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6ED8912ED), ref: 00007FF6ED8F2E4A
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6ED8912ED), ref: 00007FF6ED8F2E59
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6ED8912ED), ref: 00007FF6ED8F2E87
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$CreateValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1009429713-0
                                                                                                                                                                                                  • Opcode ID: a5f9d1af5302eabb58b364c8ea017544a65480ad4d0be97bbc380d30e66df2b1
                                                                                                                                                                                                  • Instruction ID: eae65d8df365b0ffec8e2c5ac87a3570063ef49ba487feed486e93c8730a74e5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a5f9d1af5302eabb58b364c8ea017544a65480ad4d0be97bbc380d30e66df2b1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DC21C92262CA8186D650AB26F45036FB760FBC1781F602031F7DEC7BAADF2ED5448B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$CreateDeleteValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1061628661-0
                                                                                                                                                                                                  • Opcode ID: 8a7cecb090969a5532aa5b3fc2dca81c35d1ac02003a94eed0dce26f70969546
                                                                                                                                                                                                  • Instruction ID: e314de2939576fc21e32888924713bdb701e0b9401571614f71d2f2b4f709998
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8a7cecb090969a5532aa5b3fc2dca81c35d1ac02003a94eed0dce26f70969546
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12214C2361CA81C4D6209B55F45032FA760FBC47A5F001031FADEC7BA9EE6DD5408B05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2261580123-0
                                                                                                                                                                                                  • Opcode ID: 15ee206d7a9db85eadb0491bc498764701034ca44b71a376eba69a93d2cba80a
                                                                                                                                                                                                  • Instruction ID: b7fd466f619b51214619ce2ede753c950374eb871e813834b2ff1faf4c077d79
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 15ee206d7a9db85eadb0491bc498764701034ca44b71a376eba69a93d2cba80a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A3019237B1968997E740A629E8113BE63A2FBC47C0F844031EA8DC37D6FE2DE9418705
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED92C54B
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED92C55A
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED92C57B
                                                                                                                                                                                                  • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED92C585
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1865873047-0
                                                                                                                                                                                                  • Opcode ID: 9a320a83606ab4f84e9538bd08a2a28a2435281ea81d0caeec1e0501ac2f503c
                                                                                                                                                                                                  • Instruction ID: 6ee9d0fc8da22b61f3b86c7705658e7faf392c3cca4dcd19fc886fe7c643a063
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a320a83606ab4f84e9538bd08a2a28a2435281ea81d0caeec1e0501ac2f503c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8201006792CA8181DA10EB51E89122FE760FBC47E4F400435FA8DC7B6AEFADD4408B45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Mpunctstd::ios_base::width
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 1954291571-2766056989
                                                                                                                                                                                                  • Opcode ID: f7fccb98946ad90d5602a367cf17942990f7ed3c5940b5fab82cda692d7c4fc2
                                                                                                                                                                                                  • Instruction ID: a597130a38c8757b7f8dc463d74931dc6301bfc0d57a9151f2ea3eea804c3606
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f7fccb98946ad90d5602a367cf17942990f7ed3c5940b5fab82cda692d7c4fc2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9802053260DAC585DAB09B15E8943EFA7A1F7C8780F840436DACD83BA9EE7DD545CB04
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Mpunctstd::ios_base::width
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 1954291571-2766056989
                                                                                                                                                                                                  • Opcode ID: 729011ca67db5b1e725327e37859b3bf05324d1989b00f33af30ff7ec5fdf892
                                                                                                                                                                                                  • Instruction ID: a278cb9c33e0e3534c836a605b43afaf16a531c95b05edb8ca10e460fac35e78
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 729011ca67db5b1e725327e37859b3bf05324d1989b00f33af30ff7ec5fdf892
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2802073661DAC995DAB09B15E8943EFA361F7C8780F800032DACD83BA9EE7DD545CB44
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED865499
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyFac_nodeFac_node::_Queue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID: $@
                                                                                                                                                                                                  • API String ID: 3399187363-1077428164
                                                                                                                                                                                                  • Opcode ID: 4232b6cbf855eac0dae9244dddbfc336636287f9f9070de4a350ffa5118dfb7c
                                                                                                                                                                                                  • Instruction ID: 4f504243dc11fecc3f61dfaa9c1b46f6f60c023b2643abedd7212e297c6beb00
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4232b6cbf855eac0dae9244dddbfc336636287f9f9070de4a350ffa5118dfb7c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 44D1C072219BC6A9DA709B04E8803DBB3A4FBC9344F405136D68D83BA9EF7DC548CB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED862749
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyFac_nodeFac_node::_Queue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID: $@
                                                                                                                                                                                                  • API String ID: 3399187363-1077428164
                                                                                                                                                                                                  • Opcode ID: 9c4fd0b979755bb981037196e486e6e1ec8d81fe0f18146dabfbd7608412a09f
                                                                                                                                                                                                  • Instruction ID: 4fd9fdd43b077346cb2cc3643d1b1e714f42d0f26775c0b2b4dcd8d8a3d8c1a0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9c4fd0b979755bb981037196e486e6e1ec8d81fe0f18146dabfbd7608412a09f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7D1D072619BC6A5DAB09B04E8803DBB3A4FBC9744F405136D68D83BA9EF7DC548CB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED864869
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyFac_nodeFac_node::_Queue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID: $@
                                                                                                                                                                                                  • API String ID: 3399187363-1077428164
                                                                                                                                                                                                  • Opcode ID: 9f2caa178fdc431b8a8189b42adc2950a5b3de3baa5ae9c743d19d7c6535d1d3
                                                                                                                                                                                                  • Instruction ID: d7f539f30ea2974ae45c257faa3288dfb2169fbcdb06c48f94ba2fa7fe9ba48a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9f2caa178fdc431b8a8189b42adc2950a5b3de3baa5ae9c743d19d7c6535d1d3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B7C1E472209AC6A5DA70AB14E4903EBB364FBC5340F406132D6CD83BA9EF7DC648CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FF6ED8682D9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyFac_nodeFac_node::_Queue::StructuredWorkstd::_
                                                                                                                                                                                                  • String ID: $@
                                                                                                                                                                                                  • API String ID: 3399187363-1077428164
                                                                                                                                                                                                  • Opcode ID: ff4492f9e9e75af25080778621e606f53837d729e1633b9086dcd523edf8dbc1
                                                                                                                                                                                                  • Instruction ID: 32aad0461f63b59e96b5ed7d3fc9c23d77ec8c9cf6757c4abd6778293ed4d83d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ff4492f9e9e75af25080778621e606f53837d729e1633b9086dcd523edf8dbc1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 09C1E472609AC6A5DA70AB14E4903EBB364FBC5344F406132D6CD83BA9EF7DC648CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8724B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8724CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCreateKeyW.ADVAPI32 ref: 00007FF6ED8F2CA0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: strrchr.LIBCMTD ref: 00007FF6ED8F2CB7
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegQueryValueExW.KERNEL32 ref: 00007FF6ED8F2D03
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8F2C50: RegCloseKey.KERNEL32 ref: 00007FF6ED8F2D1D
                                                                                                                                                                                                  • std::ios_base::good.LIBCPMTD ref: 00007FF6ED8DB211
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run, xrefs: 00007FF6ED8DB0B8
                                                                                                                                                                                                  • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 00007FF6ED8DB051
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsCloseCreateQueryValueshared_ptrstd::ios_base::goodstrrchrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run$Software\Microsoft\Windows\CurrentVersion\Run
                                                                                                                                                                                                  • API String ID: 3056597930-377293507
                                                                                                                                                                                                  • Opcode ID: a0a3a890a1bc4bcbe074b81dd9cb259dc5db8b50883c69ae06768deb1156cda2
                                                                                                                                                                                                  • Instruction ID: 18587b187501dc2271e899f4886dda47bb784b17dee5697406db2177a7afb10a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a0a3a890a1bc4bcbe074b81dd9cb259dc5db8b50883c69ae06768deb1156cda2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1810F3261DAC294D6709B15E8503EFB7A4FBC8784F404222E6DD87BAAEF2DD544CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  • std::bad_exception::bad_exception.LIBCMTD ref: 00007FF6EDA22AC8
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsExceptionFileHeaderRaisestd::bad_exception::bad_exceptiontype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: Memory allocation error
                                                                                                                                                                                                  • API String ID: 3813484266-4275684249
                                                                                                                                                                                                  • Opcode ID: c562724989e89e18a30640eb83d52d7c7bb901b216b3e8ef963ee951fc3eb6d7
                                                                                                                                                                                                  • Instruction ID: 68f0cacb088a2889e1a62f13612e912ce3a496749b19c5ea1cbe9168393ef4de
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c562724989e89e18a30640eb83d52d7c7bb901b216b3e8ef963ee951fc3eb6d7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8661F93760AAC595DAA0DB19E4843AEB3A5F7C4780F409032DA8D83BA9EF3DD545CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                                                                                                                  • String ID: ?
                                                                                                                                                                                                  • API String ID: 1286766494-1684325040
                                                                                                                                                                                                  • Opcode ID: 2f7bf7fbf501e3900f47610b04d47dc5a8047e9dbbe7c050f9bb232aafb040d4
                                                                                                                                                                                                  • Instruction ID: d1cf1f989e5792b0ce701859d85774b7ce1c2c76ef8fdb9a8d82cfab00c63b8c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2f7bf7fbf501e3900f47610b04d47dc5a8047e9dbbe7c050f9bb232aafb040d4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DF41F623B0878246FB609B29D40137A5650EB90BA4F144335EF7C8BAD5FF3ED641870A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Getvals
                                                                                                                                                                                                  • String ID: false$true
                                                                                                                                                                                                  • API String ID: 1336808981-2658103896
                                                                                                                                                                                                  • Opcode ID: de08c7d2208a10f8ccabf7f2b97595456c35b417132c3e0054f7f833075d07d0
                                                                                                                                                                                                  • Instruction ID: c65f63a34c443696c3995bb921b5d3aea9b51603d6258f5e60ec481e6abf03a4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: de08c7d2208a10f8ccabf7f2b97595456c35b417132c3e0054f7f833075d07d0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 54416A23B18A8199F710CF78E4002ED33B1FB98748B405226EE4D67A59EF39D696C344
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorFileLastWrite
                                                                                                                                                                                                  • String ID: U
                                                                                                                                                                                                  • API String ID: 442123175-4171548499
                                                                                                                                                                                                  • Opcode ID: 500367ecee68b6d6d332ef469be95b7e2654e043513882feea25c24787ce5705
                                                                                                                                                                                                  • Instruction ID: c57d17a82311e79084be8c2fcfd21d84b9e0ed37f79b4cf7e37837a4ce47404f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 500367ecee68b6d6d332ef469be95b7e2654e043513882feea25c24787ce5705
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6641D273B18A8182EB209F29E4443AA77A0FB98784F844131EE4EC7784EF3DD501CB45
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00007FF6ED8D8F54
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED872330: char_traits.LIBCPMTD ref: 00007FF6ED87235D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8E70A0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8E7128
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                    • Part of subcall function 00007FF6EDA84230: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  • List.LIBCMTD ref: 00007FF6ED8D8FCD
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::Work$Base::ContextEmptyExceptionFileHeaderIdentityListQueueQueue::RaiseStructuredchar_traits
                                                                                                                                                                                                  • String ID: cannot get value
                                                                                                                                                                                                  • API String ID: 1878104746-2333289761
                                                                                                                                                                                                  • Opcode ID: e61874269a6163050ec53c81dfa335a1c49060e92ed2d4cb15e840f45fe6f0dc
                                                                                                                                                                                                  • Instruction ID: 8ab3a9d1f25009b0c61470932501ca217fbbf737ebdcdaf6de876e2c2e1fe118
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e61874269a6163050ec53c81dfa335a1c49060e92ed2d4cb15e840f45fe6f0dc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB313E63A0C68791EA20A754E4413BF6761FBC5384F804032D68D877EAFE2ED645CB4A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetUserDefaultUILanguage.KERNEL32 ref: 00007FF6ED8DAF0E
                                                                                                                                                                                                  • LCIDToLocaleName.KERNEL32 ref: 00007FF6ED8DAF2D
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B97A5
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8B9730: shared_ptr.LIBCMTD ref: 00007FF6ED8B982E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: shared_ptr$Concurrency::details::EmptyQueue::StructuredWork$Char_traitsDefaultLanguageLocaleNameUsertype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: unknown
                                                                                                                                                                                                  • API String ID: 3795742680-2904991687
                                                                                                                                                                                                  • Opcode ID: 0e489a87d31d8840d1627567517f26be67033818ac0b0d047d4d38553609cefc
                                                                                                                                                                                                  • Instruction ID: 4d6ddde8886812a22e8fe655d7005f899782bd2f67424efb7105f03b17dbaa90
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e489a87d31d8840d1627567517f26be67033818ac0b0d047d4d38553609cefc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C831E37361CA8196D660DF14E4913ABB7A4FBC5784F802132E68D83BA9EF2DD544CB05
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8725A0: _WChar_traits.LIBCPMTD ref: 00007FF6ED8725CD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: type_info::_name_internal_method.LIBCMTD ref: 00007FF6ED8BA1D0
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA1FD
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: shared_ptr.LIBCMTD ref: 00007FF6ED8BA233
                                                                                                                                                                                                    • Part of subcall function 00007FF6ED8BA140: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF6ED8BA2CE
                                                                                                                                                                                                  • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF6ED91A49E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Concurrency::details::EmptyQueue::StructuredWork$Char_traitsConcurrency::details::_SchedulerScheduler::_shared_ptrtype_info::_name_internal_method
                                                                                                                                                                                                  • String ID: printer_paper$printer_toner
                                                                                                                                                                                                  • API String ID: 3970144725-2138351318
                                                                                                                                                                                                  • Opcode ID: a0ab56fb5de46f13abe8fdaf19e16e6d249fff87b2092d9ec9148d0582098cdb
                                                                                                                                                                                                  • Instruction ID: 5a06302d1905f4906aa3e299f787c3f38813f52d207d58a8c7db5290489766ef
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a0ab56fb5de46f13abe8fdaf19e16e6d249fff87b2092d9ec9148d0582098cdb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FC310432619A86A2DA50EB14F49039BB764FBC1780F806032F78D83BA9EF7DD505CB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Base::Concurrency::details::ContextIdentityListQueueWork
                                                                                                                                                                                                  • String ID: cannot get value
                                                                                                                                                                                                  • API String ID: 3422067370-2333289761
                                                                                                                                                                                                  • Opcode ID: e48909c7f4e986053b5362f1bbd216d70627c96038367436828369875f52761c
                                                                                                                                                                                                  • Instruction ID: 8159231fd868165680a2e98f89d77fb91c775982ec18ac448eac76a194b16b44
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e48909c7f4e986053b5362f1bbd216d70627c96038367436828369875f52761c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C0115C63A0C68695EA30A755E0413BE6770BBC1784F804032D68D8B7E6FE2DD505CB0A
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA84280
                                                                                                                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6ED883D5F), ref: 00007FF6EDA842C1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 0000000B.00000002.3373401288.00007FF6ED861000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FF6ED860000, based on PE: true
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3373257284.00007FF6ED860000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374700277.00007FF6EDACB000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3374948683.00007FF6EDB12000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375117455.00007FF6EDB13000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375241801.00007FF6EDB28000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375311870.00007FF6EDB2A000.00000008.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB30000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375458481.00007FF6EDB39000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  • Associated: 0000000B.00000002.3375708838.00007FF6EDB3C000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_11_2_7ff6ed860000_PcAppStore.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                                                                                                                                  • String ID: csm
                                                                                                                                                                                                  • API String ID: 2573137834-1018135373
                                                                                                                                                                                                  • Opcode ID: 09cbd3424b1f31db290bb86cadf03270a165363e4088da8c49c0ce81819aa5bc
                                                                                                                                                                                                  • Instruction ID: 58accc05e1ff0274900019dcd4b6fbcafc36952deecbdea24ae306b314109fb7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 09cbd3424b1f31db290bb86cadf03270a165363e4088da8c49c0ce81819aa5bc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 36114C37618B8082EB218F19E404359B7E5FB88B94F184234DE8D47B58EF3EC6518705